WorldWideScience

Sample records for information operations io

  1. Creating Feedback Channels With Optical Communications For Information Operations (IO)

    Science.gov (United States)

    2016-06-01

    use of online and offline QR code creation applications in industry and the availability of digital storage allow users to find, encode and decode...the persons information stored. The ability to program a Wi-Fi network’s information into a QR code is incredibly convenient as well. The ability to...coupled with negative attributes of the in-store shopping experience lead to the advancement of Internet sales. Internet connectivity and web content

  2. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  3. IO Sphere: The Professional Journal of Joint Information Operations. December 2010

    Science.gov (United States)

    2010-12-01

    reflect national strategic themes and messages. There must be constancy of actions and message from the President of the United States to the soldier’s...default.aspx. Acknowledgements: My thanks to Mike Miller , ThD, of the Joint Information Operations Warfare Center for his insights, help, and advice

  4. Information Operations Primer

    Science.gov (United States)

    2010-11-01

    Director, Information Operations & Strategic Studies Rosemary Wenchel DISES Requirements & Programs IO Intelligence Integration Plans & Policy...competitive civil service selection process. Mr. Mark H. Johnson ( DISES ) is the Director of JIOWC, and USAR Colonel Vincent D. Crabb is the Deputy

  5. The Holistic Targeting (HOT) Methodology as the Means to Improve Information Operations (IO) Target Development and Prioritization

    Science.gov (United States)

    2008-09-01

    2006. WorldCat . http://worldcat.org accessed July 2008. Compendium Download. 10 July 2008 <http://compendium.open.ac.uk/institute/download/downlo...Military and Associated Terms." Defense Technical Information Center. 2007. WorldCat . http://worldcat.org accessed June 2008. ———.———. Information

  6. Information Operations Primer

    Science.gov (United States)

    2011-11-01

    creation of two new cybersecurity organizations. At the operational level, the Cyber Defence Management Authority ( CDMA ) was established in Brussels...information contact Mr. James McNeive at 703-784-5826 ( DSN : 273) or email at jmcneive@mcia.osis.gov. Updated: October 2011 82 Back to Table of...contact JC2IOS- IO@jfsc.ndu.edu or at 757-443-6336/6333 ( DSN : 646). Web Site: http://www.jfsc.ndu.edu/ Reviewed: October 2011 151 Back to Table

  7. DoD Information Operations Center for Research

    OpenAIRE

    2012-01-01

    This memorandum cancels Deputy Secretary of Defense Memorandum, "Information Operations Center of Excellence," dated Septembet 3, 2004, and redesignates the Naval Postgraduate's School (NPS), Information Operations (IO) Center of Excellence, as the DoD Information Operations Cetner for Research. As the DoD Information Operations Center for Research, the NPS shall provide graduate-level IO education and facilitate the exploration of new IO concepts, research, analysis, and field experimentation.

  8. Scenario Development for Information Operations (IO) Experimentation

    Science.gov (United States)

    2003-07-10

    country called DYSLEXIA , whose government has been making threats to invade and appropriate a region of its neighbouring country, ABSTEMIA, which is...Network Measures and Metrics 18 Conclusion Scenarios - Tailoring, Framework, Families of Scenario Experiments - Measures, Humans, Objectives Networks

  9. Army Information Operations Officer Needs Analysis Report

    Science.gov (United States)

    2016-03-01

    helping with formatting the final report iv ARMY INFORMATION OPERATIONS OFFICER NEEDS ANALYSIS REPORT EXECUTIVE SUMMARY Research...time.” One IO officer suggested the IPO try to get a access the database that has all the old APA reports archived as a way to look at assessment

  10. Defensive Information Operations in Support of the Marine Air Ground Task Force

    Science.gov (United States)

    2007-11-02

    Report INFOSEC Information Security INFOSYS Information Systems IO Information Operations ISMO Information Systems Management Office...scanning software. “ Much of the success of the Information Systems Management Office ( ISMO ) team comes from educating the Marines on these dangers and

  11. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  12. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  13. A Novel Application of CWMP: An Operator-grade Management Platform for IoT

    Directory of Open Access Journals (Sweden)

    Martin Stusek

    2016-12-01

    Full Text Available The aggressive expansion of emerging smart devices connected to the Internet infrastructure is nowadays considered as one of the most challenging components of the Internet of Things (IoT vision. As a particular segment of IoT, the smart home gateways, also named Machine-Type Communication Gateway (MTCG, become an important direction for industry including telecommunication operators. In most cases, the MTCG acts as a bridge between connected smart objects and the public network (Internet. As a consequence of the IoT domain expansion, the separate configuration of each individual Machine-to-Machine (M2M device is not feasible anymore due to steadily growing numbers of M2M nodes. To perform this task, several novel technologies have recently been introduced. However, legacy protocols and mechanisms for remote network management still retain a certain application potential for IoT. Accordingly, we have investigated the protocol TR-069 with a particular focus on its usability for MTCG. To this end, the software module (bundle based on the TR-069 for remote configuration and management of MTCG, as well as for controlling the end smart devices, has been developed. We believe that our implementation (available as open source on GitHub can serve as an important building block for efficient management of future IoT devices. Therefore, TR-069 protocol constitutes a proven and standardized technology and could be easily deployed by most of the network and service providers today. Authors would like to recall that this paper represents extended version of their previously published work at TSP 2016 conference.

  14. Improving Operational System Performance of Internet of Things (IoT) in Indonesia Telecomunication Company

    Science.gov (United States)

    Dachyar, M.; Risky, S. A.

    2014-06-01

    Telecommunications company have to improve their business performance despite of the increase customers every year. In Indonesia, the telecommunication company have provided best services, improving operational systems by designing a framework for operational systems of the Internet of Things (IoT) other name of Machine to Machine (M2M). This study was conducted with expert opinion which further processed by the Analytic Hierarchy Process (AHP) to obtain important factor for organizations operational systems, and the Interpretive Structural Modeling (ISM) to determine factors of organization which found drives the biggest power. This study resulted, the greatest weight of SLA & KPI handling problems. The M2M current dashboard and current M2M connectivity have power to affect other factors and has important function for M2M operations roomates system which can be effectively carried out.

  15. Panel summary of cyber-physical systems (CPS) and Internet of Things (IoT) opportunities with information fusion

    Science.gov (United States)

    Blasch, Erik; Kadar, Ivan; Grewe, Lynne L.; Brooks, Richard; Yu, Wei; Kwasinski, Andres; Thomopoulos, Stelios; Salerno, John; Qi, Hairong

    2017-05-01

    During the 2016 SPIE DSS conference, nine panelists were invited to highlight the trends and opportunities in cyber-physical systems (CPS) and Internet of Things (IoT) with information fusion. The world will be ubiquitously outfitted with many sensors to support our daily living thorough the Internet of Things (IoT), manage infrastructure developments with cyber-physical systems (CPS), as well as provide communication through networked information fusion technology over the internet (NIFTI). This paper summarizes the panel discussions on opportunities of information fusion to the growing trends in CPS and IoT. The summary includes the concepts and areas where information supports these CPS/IoT which includes situation awareness, transportation, and smart grids.

  16. Advanced Information Processing System (AIPS) proof-of-concept system functional design I/O network system services

    Science.gov (United States)

    1985-01-01

    The function design of the Input/Output (I/O) services for the Advanced Information Processing System (AIPS) proof of concept system is described. The data flow diagrams, which show the functional processes in I/O services and the data that flows among them, are contained. A complete list of the data identified on the data flow diagrams and in the process descriptions are provided.

  17. Users of the main smartphone operating systems (iOS, Android) differ only little in personality.

    Science.gov (United States)

    Götz, Friedrich M; Stieger, Stefan; Reips, Ulf-Dietrich

    2017-01-01

    The increasingly widespread use of mobile phone applications (apps) as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081) and a German-speaking sample (Study 2; N = 2,438). As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five). Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows). In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1), ηp2 = .005 to .036 (Study 2), respectively) and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  18. A Network Coverage Information-Based Sensor Registry System for IoT Environments.

    Science.gov (United States)

    Jung, Hyunjun; Jeong, Dongwon; Lee, Sukhoon; On, Byung-Won; Baik, Doo-Kwon

    2016-07-25

    The Internet of Things (IoT) is expected to provide better services through the interaction of physical objects via the Internet. However, its limitations cause an interoperability problem when the sensed data are exchanged between the sensor nodes in wireless sensor networks (WSNs), which constitute the core infrastructure of the IoT. To address this problem, a Sensor Registry System (SRS) is used. By using a SRS, the information of the heterogeneous sensed data remains pure. If users move along a road, their mobile devices predict their next positions and obtain the sensed data for that position from the SRS. If the WSNs in the location in which the users move are unstable, the sensed data will be lost. Consider a situation where the user passes through dangerous areas. If the user's mobile device cannot receive information, they cannot be warned about the dangerous situation. To avoid this, two novel SRSs that use network coverage information have been proposed: one uses OpenSignal and the other uses the probabilistic distribution of the users accessing SRS. The empirical study showed that the proposed method can seamlessly provide services related to sensing data under any abnormal circumstance.

  19. Enhancing IoT Systems by Exploiting Opportunistically Collected Information from Communication Networks

    DEFF Research Database (Denmark)

    Mikkelsen, Lars Møller

    2017-01-01

    in obtaining these information types is how to measure and collect them. This is because they are highly dynamic as they are influenced by the current situation at the location where they are measured. In this work, we propose how to obtain these parameters cost effectively by opportunistically collecting them...... at low cost, which are used for populating a network performance map with real network measurements. We focus on the network performance between end user device and back end system, including the 3G and 4G cellular connections and their influence on the application traffic. Specifically, we look...... using automated approaches. Specifically, network performance information is collected using crowd sourcing measurements and people count information is obtained as estimations based on passively collected WiFi probes. Furthermore, we propose how to exploit the collected information types in a real Io...

  20. Kontextbaserad information genom iBeacon : En implementation i iOS och Android

    OpenAIRE

    2014-01-01

    I dagsläget växer behovet av rätt information vid rätt plats, kontextbaserad information. Med hjälp av iBeacon kan man till en stor utsträckning förse det här behovet med en lösning. I uppsatsen undersöks användningsområden för iBeacon och idéer för hur man kan utveckla lösningar med hjälp av iBeacon. Ett koncept kommer att implementeras för att distribuera kontextbaserad information på mässor. Konceptet utvecklades till iOS och Android. Applikationerna tar hjälp av en webbtjänst för att unde...

  1. Users of the main smartphone operating systems (iOS, Android) differ only little in personality

    Science.gov (United States)

    Stieger, Stefan; Reips, Ulf-Dietrich

    2017-01-01

    The increasingly widespread use of mobile phone applications (apps) as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081) and a German-speaking sample (Study 2; N = 2,438). As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five). Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows). In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1), ηp2 = .005 to .036 (Study 2), respectively) and may reflect differences in sociodemographic composition, rather than operating system of smartphone users. PMID:28467473

  2. iOS app development for dummies

    CERN Document Server

    Feiler, Jesse

    2014-01-01

    If you've got incredible iOS ideas, get this book and bring them to life! iOS 7 represents the most significant update to Apple's mobile operating system since the first iPhone was released, and even the most seasoned app developers are looking for information on how to take advantage of the latest iOS 7 features in their app designs. That's where iOS App Development For Dummies comes in! Whether you're a programming hobbyist wanting to build an app for fun or a professional developer looking to expand into the iOS market, this book will walk you through the fundamentals of building a univer

  3. A reference architecture for IoT-based logistic information systems in agrifood supply chains

    NARCIS (Netherlands)

    Verdouw, C.N.; Robbemond, R.M.; Verwaart, T.; Wolfert, J.; Beulens, A.J.M.

    2015-01-01

    Logistics in the food and agribusiness industry must address perishable products, unpredictable supply variations and stringent food safety and sustainability requirements. The Internet of Things (IoT) could contribute significantly to solve these challenges because it allows for remotely

  4. A Software-Defined Approach to IoT Networking

    Institute of Scientific and Technical Information of China (English)

    Christian Jacquenet; Mohamed Boucadair

    2016-01-01

    It is foreseen that the Internet of Things (IoT) will comprise billions of connected devices, and this will make the provi⁃sioning and operation of some IoT connectivity services more challenging. Indeed, IoT services are very different from lega⁃cy Internet services because of their dimensioning figures and also because IoT services differ dramatically in terms of na⁃ture and constraints. For example, IoT services often rely on energy and CPU⁃constrained sensor technologies, regardless of whether the service is for home automation, smart building, e⁃health, or power or water metering on a regional or national scale. Also, some IoT services, such as dynamic monitoring of biometric data, manipulation of sensitive information, and pri⁃vacy needs to be safeguarded whenever this information is for⁃warded over the underlying IoT network infrastructure. This paper discusses how software⁃defined networking (SDN) can facilitate the deployment and operation of some advanced IoT services regardless of their nature or scope. SDN introduces a high degree of automation in service delivery and operation—from dynamic IoT service parameter exposure and negotiation to resource allocation, service fulfillment, and assurance. This paper does not argue that all IoT services must adopt SDN. Rather, it is left to the discretion of operators to decide which IoT services can best leverage SDN capabilities. This paper only discusses managed IoT services, i.e., services that are op⁃erated by a service provider.

  5. IoT-Based Information System for Healthcare Application: Design Methodology Approach

    Directory of Open Access Journals (Sweden)

    Damian Dziak

    2017-06-01

    Full Text Available Over the last few decades, life expectancy has increased significantly. However, elderly people who live on their own often need assistance due to mobility difficulties, symptoms of dementia or other health problems. In such cases, an autonomous supporting system may be helpful. This paper proposes the Internet of Things (IoT-based information system for indoor and outdoor use. Since the conducted survey of related works indicated a lack of methodological approaches to the design process, therefore a Design Methodology (DM, which approaches the design target from the perspective of the stakeholders, contracting authorities and potential users, is introduced. The implemented solution applies the three-axial accelerometer and magnetometer, Pedestrian Dead Reckoning (PDR, thresholding and the decision trees algorithm. Such an architecture enables the localization of a monitored person within four room-zones with accuracy; furthermore, it identifies falls and the activities of lying, standing, sitting and walking. Based on the identified activities, the system classifies current activities as normal, suspicious or dangerous, which is used to notify the healthcare staff about possible problems. The real-life scenarios validated the high robustness of the proposed solution. Moreover, the test results satisfied both stakeholders and future users and ensured further cooperation with the project.

  6. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android

    National Research Council Canada - National Science Library

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan; Sunyaev, Ali

    2015-01-01

    .... The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements...

  7. A reference architecture for IoT-based logistic information systems in agrifood supply chains

    NARCIS (Netherlands)

    Verdouw, C.N.; Robbemond, R.M.; Verwaart, T.; Wolfert, J.; Beulens, A.J.M.

    2015-01-01

    Logistics in the food and agribusiness industry must address perishable products, unpredictable supply variations and stringent food safety and sustainability requirements. The Internet of Things (IoT) could contribute significantly to solve these challenges because it allows for remotely controllin

  8. IoT Technology Development and Application Analysis for Operators%运营商角度的物联网技术发展应用浅析

    Institute of Scientific and Technical Information of China (English)

    曹钟慧

    2016-01-01

    In order to promote the development of IoT industry, look for the IoT business opportunities for the telecom operators, the technical scope, key theoretical and technical issues of the IoT were discussed in view of analysis of the IoT architecture study domestic and abroad. The paper focused on the technology application of IoT from the perspective of the communications industry, addressing serious challenges in embracing the IoT development, and giving suggestions of concerned problems to catch the opportunity IOE development.%为了促进物联网产业的发展,寻找电信运营商的物联网商机,在分析国内外物联网系统研究的基础上,讨论了物联网相关的技术范畴、关键理论和技术瓶颈,着重从电信行业的角度,研究基于移动通信网络的物联网技术应用,探讨运营商在物联网发展所遇到的挑战,提出要抓住万物互联发展新机遇需关注的问题以及相关建议。

  9. Reactor operation environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Bauer, L.R.; Hayes, D.W.; Hunter, C.H.; Marter, W.L.; Moyer, R.A.

    1989-12-01

    This volume is a reactor operation environmental information document for the Savannah River Plant. Topics include meteorology, surface hydrology, transport, environmental impacts, and radiation effects. 48 figs., 56 tabs. (KD)

  10. Information Operations: Reassessing Doctrine and Organization

    Science.gov (United States)

    2007-11-02

    operations include electronic warfare, psychological operations, physical attack/destruction, operations security, deception, and special information operations...computer network operations, and computer network exploitation—all related terms but each with its own slightly different definition. SPECIAL INFORMATION OPERATIONS... Special information operations (SIO) are not clearly defined in Joint publications and only described as "information operations that by

  11. Information Operations: Moving From Doctrine to Execution

    Science.gov (United States)

    1999-04-01

    electronic warfare. The doctrine identifies a new capability called special information operations (SIO). SIO includes computer network attack (CNA...warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while denying... special information operations, and could include computer network attack. (Joint Pub 3- 13) Physical attack. The means to disrupt, damage, or destroy

  12. Topography of Io (color)

    Science.gov (United States)

    1997-01-01

    The images used to create this color composite of Io were acquired by Galileo during its ninth orbit (C9) of Jupiter and are part of a sequence of images designed to map the topography or relief on Io and to monitor changes in the surface color due to volcanic activity. Obtaining images at low illumination angles is like taking a picture from a high altitude around sunrise or sunset. Such lighting conditions emphasize the topography of the volcanic satellite. Several mountains up to a few miles high can be seen in this view, especially near the upper right. Some of these mountains appear to be tilted crustal blocks. Most of the dark spots correspond to active volcanic centers.North is to the top of the picture which merges images obtained with the clear, red, green, and violet filters of the solid state imaging (CCD) system on NASA's Galileo spacecraft. . The resolution is 8.3 kilometers per picture element. The image was taken on June 27, 1997 at a range of 817,000 kilometers by the solid state imaging (CCD) system on NASA's Galileo spacecraft.The Jet Propulsion Laboratory, Pasadena, CA manages the Galileo mission for NASA's Office of Space Science, Washington, DC. JPL is an operating division of California Institute of Technology (Caltech).This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  13. FabIO

    DEFF Research Database (Denmark)

    Bergbäck Knudsen, Erik; Sørensen, Henning O.; Wright, Jonathan P.

    2013-01-01

    FabIO is a Python module written for easy and transparent reading of raw two-dimensional data from various X-ray detectors. The module provides a function for reading any image and returning a fabioimage object which contains both metadata (header information) and the raw data. All fabioimage...

  14. High performance parallel I/O

    CERN Document Server

    Prabhat

    2014-01-01

    Gain Critical Insight into the Parallel I/O EcosystemParallel I/O is an integral component of modern high performance computing (HPC), especially in storing and processing very large datasets to facilitate scientific discovery. Revealing the state of the art in this field, High Performance Parallel I/O draws on insights from leading practitioners, researchers, software architects, developers, and scientists who shed light on the parallel I/O ecosystem.The first part of the book explains how large-scale HPC facilities scope, configure, and operate systems, with an emphasis on choices of I/O har

  15. Information Practices and User Interfaces: Student Use of an iOS Application in Special Education

    Science.gov (United States)

    Demmans Epp, Carrie; McEwen, Rhonda; Campigotto, Rachelle; Moffatt, Karyn

    2016-01-01

    A framework connecting concepts from user interface design with those from information studies is applied in a study that integrated a location-aware mobile application into two special education classes at different schools; this application had two support modes (one general and one location specific). The five-month study revealed several…

  16. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android

    Science.gov (United States)

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan

    2015-01-01

    Background Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. Objective The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. Methods We assessed apps available in English and offered in the categories “Medical” and “Health & Fitness” in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. Results We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose

  17. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android.

    Science.gov (United States)

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan; Sunyaev, Ali

    2015-01-19

    Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. We assessed apps available in English and offered in the categories "Medical" and "Health & Fitness" in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through

  18. Integration of hospital information systems, operative and peri-operative information systems, and operative equipment into a single information display.

    Science.gov (United States)

    Meyer, Mark; Levine, Wilton C; Brzezinski, Philip; Robbins, Jeffrey; Lai, Fuji; Spitz, Gabriel; Sandberg, Warren S

    2005-01-01

    The integration of disparate information systems in the operative environment allows access to information that is typically unseen or unused. Through a collaborative effort, a variety of information systems and surgical equipment are being integrated. This provides improved context-sensitive information display and decision support and improved access to information to improve workflow, safety and visualization of information that was previously unattainable.

  19. Joint Operational Medicine Information Systems (JOMIS)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Joint Operational Medicine Information Systems (JOMIS) Defense Acquisition Management...August 24, 2015 Program Information Program Name Joint Operational Medicine Information Systems (JOMIS) DoD Component DoD The acquiring DoD...Defense’s (DoD’s) operational medicine information systems by fielding the DoD Modernized Electronic Health Record (EHR) solution while developing and

  20. Information Operations and FATA Integration into the National Mainstream

    Science.gov (United States)

    2012-09-01

    what information warfare (IW) and IO is, it is appropriate to define what information is: (D) ata that (1) has been verified to be accurate and...bring them up to par with the settle areas. 90 THIS PAGE INTENTIONALLY LEFT BLANK 91 APPENDIX J. SUMMARY OF SOCIOECONOMIC INDICATORS Serial

  1. INFORMATION ASSURANCE - INTELLIGENCE - INFORMATION SUPERIORITY RELATIONSHIP WITHIN NATO OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe BOARU, Ioan-Mihai ILIEŞ

    2011-01-01

    Full Text Available There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations. The intelligence cycle has a discrete architecture and provides on-time and relevant intelligence products to the joint force commanders and to other authorized users in a specifi c joint area of operations. The intelligence cycle must follow the evolution of the operation. A permanent intelligence estimate will be performed during the military decision making process and operations execution. Information superiority is one of the most powerful intelligence cycle achievements. and decisively infuences the success of NATO joint operations. Information superiority must be preserved and enhanced through information assurance. Information assurance is an information operation that must be planned by the military in charge of operation security or by non-military experts, executed by all personnel during the entire intelligence cycle life time and employed during the planning and execution of NATO joint operations.

  2. Reactor operation safety information document

    Energy Technology Data Exchange (ETDEWEB)

    1990-01-01

    The report contains a reactor facility description which includes K, P, and L reactor sites, structures, operating systems, engineered safety systems, support systems, and process and effluent monitoring systems; an accident analysis section which includes cooling system anomalies, radioactive materials releases, and anticipated transients without scram; a summary of onsite doses from design basis accidents; severe accident analysis (reactor core disruption); a description of operating contractor organization and emergency planning; and a summary of reactor safety evolution. (MB)

  3. Organizing Joint Forces for Information Operations: The Viability of a Joint Force Information Operations Component Commander

    Science.gov (United States)

    1999-04-01

    civil affairs (CA), electronic warfare (EW), physical attack/destruction, special information operations (SIO), and, potentially, computer network... Special information operations are “information operations that by their sensitive nature, due to their potential effect or impact, security...security, counterdeception, counterpropaganda, public affairs, counterintelligence (CI), electronic warfare (EW), and special information operations (SIO

  4. Development of eStudent iOS mobile application

    Directory of Open Access Journals (Sweden)

    Mladjan Antic

    2013-01-01

    Full Text Available Abstract— iOS is the Apple mobile operating system, for Apple mobile devices. Initially developed for iPhone, and later for iPod Touch, iPad, AppleTV. The Metropolitan University has a Web application titled eStudent, which enables students by Web to get information about their marks for all subjects, their financies, exam scheduling, professors and assistents, and send exam registration and feedback about teaching, etc. This paper explains the development of the mobile application eStudent on the iOS platform. This application enables students whenever they want, by using their iPhone mobile phone, to get access to the information from the eStudent Web application, and to present it on their iPhone User Interface (UI. This paper explains in details software requirements analysis, system architecture, system modelling, and UI of the eStudent iOS mobile application.

  5. Measuring Information Technology Performance: Operational Efficiency and Operational Effectiveness

    Science.gov (United States)

    Moore, Annette G.

    2012-01-01

    This dissertation provides a practical approach for measuring operational efficiency and operational effectiveness for IT organizations introducing the ITIL process framework. The intent of the study was to assist Chief Information Officers (CIOs) in explaining the impact of introducing the Information Technology Infrastructure Library (ITIL)…

  6. Measuring Information Technology Performance: Operational Efficiency and Operational Effectiveness

    Science.gov (United States)

    Moore, Annette G.

    2012-01-01

    This dissertation provides a practical approach for measuring operational efficiency and operational effectiveness for IT organizations introducing the ITIL process framework. The intent of the study was to assist Chief Information Officers (CIOs) in explaining the impact of introducing the Information Technology Infrastructure Library (ITIL)…

  7. DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM

    Directory of Open Access Journals (Sweden)

    Hongliang Liang

    2016-12-01

    Full Text Available iOS is a popular operating system on Apple’s smartphones, and recent security events have shown the possibility of stealing the users' privacy in iOS without being detected, such as XcodeGhost. So, we present the design and implementation of a malware vetting system, called DMIA. DMIA first collects runtime information of an app and then distinguish between malicious and normal apps by a novel machine learning model. We evaluated DMIA with 1000 apps from the official App Store. The results of experiments show that DMIA is effective in detecting malwares aimed to steal privacy.

  8. Reactor operation environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Haselow, J.S.; Price, V.; Stephenson, D.E.; Bledsoe, H.W.; Looney, B.B.

    1989-12-01

    The Savannah River Site (SRS) produces nuclear materials, primarily plutonium and tritium, to meet the requirements of the Department of Defense. These products have been formed in nuclear reactors that were built during 1950--1955 at the SRS. K, L, and P reactors are three of five reactors that have been used in the past to produce the nuclear materials. All three of these reactors discontinued operation in 1988. Currently, intense efforts are being extended to prepare these three reactors for restart in a manner that protects human health and the environment. To document that restarting the reactors will have minimal impacts to human health and the environment, a three-volume Reactor Operations Environmental Impact Document has been prepared. The document focuses on the impacts of restarting the K, L, and P reactors on both the SRS and surrounding areas. This volume discusses the geology, seismology, and subsurface hydrology. 195 refs., 101 figs., 16 tabs.

  9. Reactor operation environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Wike, L.D.; Specht, W.L.; Mackey, H.E.; Paller, M.H.; Wilde, E.W.; Dicks, A.S.

    1989-12-01

    The Savannah River Site (SRS) is a large United States Department of Energy installation on the upper Atlantic Coastal Plain of South Carolina. The SRS contains diverse habitats, flora, and fauna. Habitats include upland terrestrial areas, varied wetlands including Carolina Bays, the Savannah River swamp system, and impoundment related and riparian wetlands, and the aquatic habitats of several stream systems, two large cooling reservoirs, and the Savannah River. These diverse habitats support a large variety of plants and animals including many commercially or recreational valuable species and several rare, threatened or endangered species. This volume describes the major habitats and their biota found on the SRS, and discuss the impacts of continued operation of the K, L, and P production reactors.

  10. Integration of Information Operations in Combat

    Science.gov (United States)

    2008-12-01

    the U.S. response was minimal. In December 1999 and into 2000, Al Qaeda planned attacks against U.S. and Israeli tourists during millennial ...the Army as well as within the IO community itself. While IO warriors continue to wage the battle on the terrorists throughout the world, there is...doctrinal tasks. The absence of policy and guidance, as well as the absence of clear outlined goals while developing and waging a strategy, has the

  11. Occurrence reporting and processing of operations information

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-07-21

    DOE O 232.1A, Occurrence Reporting and Processing of Operations Information, and 10 CFR 830.350, Occurrence Reporting and Processing of Operations Information (when it becomes effective), along with this manual, set forth occurrence reporting requirements for Department of Energy (DOE) Departmental Elements and contractors responsible for the management and operation of DOE-owned and -leased facilities. These requirements include categorization of occurrences related to safety, security, environment, health, or operations (``Reportable Occurrences``); DOE notification of these occurrences; and the development and submission of documented follow-up reports. This Manual provides detailed information for categorizing and reporting occurrences at DOE facilities. Information gathered by the Occurrence Reporting and processing System is used for analysis of the Department`s performance in environmental protection, safeguards and security, and safety and health of its workers and the public. This information is also used to develop lessons learned and document events that significantly impact DOE operations.

  12. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    These Russian advancements stimulated the West and led to the development of various technologies critical to EW, such as transistors , traveling wave...satellite signals to determine position, velocity, and direction. GPS and precision navigation and positioning ( PNP ) give modern weapon systems the...ability to precisely attack selected targets, which minimizes collateral damage. GPS and PNP contribute to the effectiveness of targeting and

  13. The Use of Information Operations (IO) in Immersive Virtual Environments (IVE)

    Science.gov (United States)

    2010-06-01

    notwithstanding, there is a large intersection between MMORPGs and IVEs. World of Warcraft [7] is one of the more popular MMORPGs in use today. User interaction...and capabilities within World of Warcraft are very similar to those found in Second Life. Still, two key differences provide a clear distinction...environment is finite, constrained by a fixed size. For example, in World of Warcraft , the environment is comprised of two continents on the world

  14. Information Operations Versus Civilian Marketing and Advertising: A Comparative Analysis to Improve IO Planning and Strategy

    Science.gov (United States)

    2008-03-01

    Marketing.....................................................................23 2. Basic Marketing Strategy ..................................................................24...involved with developing marketing strategy will be defined as they are used throughout the rest of this chapter. 2. Basic Marketing Strategy Since...aspects of marketing strategy based on two Universities that are widely accepted as the best business schools in the United States. It is not the

  15. IO Sphere: The Professional Journal of Joint Information Operations. Special Edition 2008

    Science.gov (United States)

    2008-01-01

    He references Canadian Marshall McLuhan , who famously wrote “the medium is the message.” Finally, CDR Moss notes that Canada has developed a...Hollywood hack will not be quoted.) Instead, the reference here is to Marshall McLuhan (see book jacket), a name endured by many Canadians during... Marshall McLuhan’s view, the Internet environment is more similar to the acoustic than the visual environment. Let’s examine the following

  16. Information Operations Team Training & Information Operations Training Aid, Information Warfare Effectiveness (IWE) Program, Delivery Order 8

    Science.gov (United States)

    2010-03-01

    Eclipse-based rich client platform ( RCP ) with both student and instructor modes and five IFO planning modules: PSYOP, MD, OPSEC, PA and CI. IFOTA 4.0...course. IO and Cyber schoolhouse classrooms are equipped with cutting edge communication and computer systems, including secure video teleconferencing...taken from the PYSOP PT. The user testing opportunity drew forth more fully defined customer requirements, prompting the proposal of an RCP solution

  17. Eye on Io.

    Science.gov (United States)

    Lewis, Scott M.

    1985-01-01

    "Io," one of four satellites of Jupiter, orbits its mother planet in roughly the same plane as Earth orbits the sun. Guidelines for collecting data about Io using a reflecting telescope, 35mm camera, and adapter are presented. A computer program used in studying Io's maximum distance from Jupiter is available. (DH)

  18. On Telecom Operators Build "Cloud & Pipeline & Terminal" to Assist IoT Development%电信运营商构建“云管端”助力发展物联网浅谈

    Institute of Scientific and Technical Information of China (English)

    梁渭雄

    2016-01-01

    为了研究电信运营商如何通过构建“云管端”来更好地发展物联网产业,分析了其发展物联网所面临的机会和威胁、优势和劣势,指出目前物联网正处于产业大发展的前夜,电信运营商应该把握这个重大机遇,结合自身优势,在“云管端”全面布局,打造物联网开放平台,研发物联网拳头产品,推广物联网应用和数据服务,形成行之有效的商业模式,以构建物联网发展的优势。%For telecom operators to figure out how to better develop the IoT industry by building "Cloud & Pipeline & Terminal", this paper made the SWOT analysis, pointed out that the IoT industry is in the eve of great development. Telecom operators should seize this great opportunity, bring into play their advantages, deploy altogether in the "Cloud & Pipeline & Terminal", create an open platform for IoT, research and develop outstanding products of IoT, promote applications and data services of IoT, construct effective business model, and form the new developing advantages of IoT.

  19. Convergence of functional areas in information operations

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2015-02-01

    Full Text Available Background: Contemporary technology and its rapid rise to a ubiquitous nature are affecting the way in which technology is used. This holds implications for military information operations and information warfare concepts as the previously separate functional areas are increasingly overlapping due to the increased convergence of information technology.Objective: The aim of the article is to illustrate the convergence of the functional areas of information operations through the use of reported examples and descriptive models. Methods: A qualitative review and analysis of practitioner documents, academic publications, and other reports is conducted. The diverse views of this phenomenon are contrasted and discussed. The possible implications of the convergence and possible management techniques are proposed and discussed. Results: There is strong opinion that the domains are not converging, however practice shows that there is an increasing overlap of operational considerations and organisational structure. Conclusion: It is concluded that the domains are not converging, but the operations and management of the information operations functional areas may converge, and this has an impact across all functional areas that needs to be taken into consideration.

  20. Modeling decisions information fusion and aggregation operators

    CERN Document Server

    Torra, Vicenc

    2007-01-01

    Information fusion techniques and aggregation operators produce the most comprehensive, specific datum about an entity using data supplied from different sources, thus enabling us to reduce noise, increase accuracy, summarize and extract information, and make decisions. These techniques are applied in fields such as economics, biology and education, while in computer science they are particularly used in fields such as knowledge-based systems, robotics, and data mining. This book covers the underlying science and application issues related to aggregation operators, focusing on tools used in practical applications that involve numerical information. Starting with detailed introductions to information fusion and integration, measurement and probability theory, fuzzy sets, and functional equations, the authors then cover the following topics in detail: synthesis of judgements, fuzzy measures, weighted means and fuzzy integrals, indices and evaluation methods, model selection, and parameter extraction. The method...

  1. The operational meaning of quantum conditional information

    CERN Document Server

    Devetak, I; Devetak, Igor; Yard, Jon

    2006-01-01

    With a statistical view towards information and noise, information theory derives ultimate limitations on information processing tasks. These limits are generally expressed in terms of entropic measures of information and correlations. Here we answer the quantum information-theoretic question: ``How correlated are two quantum systems from the perspective of a third?" by solving the following `quantum state redistribution' problem. Given an arbitrary quantum state of three systems, where Alice holds two and Bob holds one, what is the cost, in terms of quantum communication and entanglement, for Alice to give one of her parts to Bob? The communication cost gives the first operational interpretation to quantum conditional mutual information. The optimal procedure is self-dual under time reversal and is perfectly composable. This generalizes known protocols such as the state merging and fully quantum Slepian-Wolf protocols, from which almost every known protocol in quantum Shannon theory can be derived.

  2. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Directory of Open Access Journals (Sweden)

    Insung Hong

    2014-01-01

    Full Text Available Owing to a paradigm shift toward Internet of Things (IoT, researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  3. IoT-based smart garbage system for efficient food waste management.

    Science.gov (United States)

    Hong, Insung; Park, Sunghoi; Lee, Beomseok; Lee, Jaekeun; Jeong, Daebeom; Park, Sehyun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  4. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Science.gov (United States)

    Lee, Jaekeun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%. PMID:25258730

  5. Developing a knowledge system for information operations

    CSIR Research Space (South Africa)

    Leenen, L

    2011-03-01

    Full Text Available of a knowledge system that can be used to extract relevant and complete knowledge for the planning and execution of Information Operations. During this initial phase of the project, we performed a needs analysis and problem analysis and our main finding...

  6. Analysis of information systems for hydropower operations

    Science.gov (United States)

    Sohn, R. L.; Becker, L.; Estes, J.; Simonett, D.; Yeh, W. W. G.

    1976-01-01

    The operations of hydropower systems were analyzed with emphasis on water resource management, to determine how aerospace derived information system technologies can increase energy output. Better utilization of water resources was sought through improved reservoir inflow forecasting based on use of hydrometeorologic information systems with new or improved sensors, satellite data relay systems, and use of advanced scheduling techniques for water release. Specific mechanisms for increased energy output were determined, principally the use of more timely and accurate short term (0-7 days) inflow information to reduce spillage caused by unanticipated dynamic high inflow events. The hydrometeorologic models used in predicting inflows were examined to determine the sensitivity of inflow prediction accuracy to the many variables employed in the models, and the results used to establish information system requirements. Sensor and data handling system capabilities were reviewed and compared to the requirements, and an improved information system concept outlined.

  7. Diabetes Applications for Arabic Speakers: A Critical Review of Available Apps for Android and iOS Operated Smartphones.

    Science.gov (United States)

    Alhuwail, Dari

    2016-01-01

    Today, 415 million adults have diabetes; more than 35 million of diabetic adults live in the Middle East and North Africa region. Smartphone penetration in the region is high and applications, or apps, for diabetics have shown promising results in recent years. This study took place between September and December 2015 and reviewed all currently available smartphone diabetes apps for Arabic speakers in both the Apple App and Google Play stores. There were only few diabetes apps for Arabic speakers; only eighteen apps were discovered and considered for this study. Most apps were informational. Only three apps offered utilities such as glucose reading conversion. The apps had issues related to information quality and adherence to latest evidence-based medical advice. There is a need for more evidence-based Arabic diabetes apps with improved functionality. Future research of Arabic diabetes apps should also focus on the involvement and engagement of the patients in the design of these apps.

  8. Strategy Planning Visualization Tool (SPVT) for the Air Operations Center (AOC). Volume 2: Information Operations (IO) Planning Enhancements

    Science.gov (United States)

    2009-12-31

    a. REPORT U b. ABSTRACT U c. THIS PAGE U 19b. TELEPONE NUMBER (Include area code) 937-255- 8814 184 ii This page...Suite 200 AFRL/HECP Dayton, OH 45431 2255 H Street (937) 910-6400 Wright-Patterson AFB OH 45433-7022 (937) 910-6401 FAX (937) 255- 8814 ...DSN 785- 8814 B-3 Signatures Author: Approvers: Michael Hutt Thomas Beresford Teneo Task Lead AOC SPVT

  9. Intraosseous (IO) route .

    African Journals Online (AJOL)

    All drugs and fluids given via intravenous route were safely given through IO route with superior to ... was used widely during the Korean War, In 1950-1960. Intravenous ... In this article a brief review and analysis of cases managed by IO route ...

  10. Ethical Considerations of Computer Network Attack in Information Warfare

    Science.gov (United States)

    2001-01-16

    attack/destruction, and special information operations (SIO). CNA and the other methods of offensive IO represent the incorporation of information...psychological operations, electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network...to computer networks to record information sent over them. 41 special information operations. Information operations that by their sensitive nature

  11. Commercial Air Carrier Vulnerabilities to Information Operations

    Science.gov (United States)

    2007-11-02

    GMO /ENS/02E-11 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio...AFIT/ GMO /ENS/02E-11 COMMERCIAL AIR CARRIER VULNERABILITIES TO INFORMATION OPERATIONS...networks that without them, “there is no water coming out of your tap; there is no electricity lighting your room; there is no food being transported to

  12. The Role of Special Forces in Information Operations

    Science.gov (United States)

    2000-06-02

    Counterdeception, Counterpropaganda, Counterintelligence, Special Information Operations and Computer Network Attack) to demonstrate the potential role of Special Forces units in future Information Operations.

  13. 76 FR 72243 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Veterans...

    Science.gov (United States)

    2011-11-22

    ... facilities for returning Operation Enduring Freedom/ Operation Iraqi Freedom veterans and their families... AFFAIRS Proposed Information Collection (Operation Enduring Freedom/ Operation Iraqi Freedom Veterans.... Title: Operation Enduring Freedom/Operation Iraqi Freedom Veterans Health Needs Assessment, VA Form 10...

  14. An Operational Perspective of Total Lightning Information

    Science.gov (United States)

    Nadler, David J.; Darden, Christopher B.; Stano, Geoffrey; Buechler, Dennis E.

    2009-01-01

    The close and productive collaborations between the NWS Warning and Forecast Office, the Short Term Prediction and Research Transition Center at NASA Marshall Space Flight Center and the University of Alabama in Huntsville have provided a unique opportunity for science sharing and technology transfer. One significant technology transfer that has provided immediate benefits to NWS forecast and warning operations is the use of data from the North Alabama Lightning Mapping Array. This network consists of ten VHF receivers deployed across northern Alabama and a base station located at the National Space Science and Technology Center. Preliminary investigations done at WFO Huntsville, along with other similar total lightning networks across the country, have shown distinct correlations between the time rate-of-change of total lightning and trends in intensity/severity of the parent convective cell. Since May 2003 when WFO HUN began receiving these data - in conjunction with other more traditional remotely sensed data (radar, satellite, and surface observations) -- have improved the situational awareness of the WFO staff. The use of total lightning information, either from current ground based systems or future space borne instrumentation, may substantially contribute to the NWS mission, by enhancing severe weather warning and decision-making processes. Operational use of the data has been maximized at WFO Huntsville through a process that includes forecaster training, product implementation, and post event analysis and assessments. Since receiving these data, over 50 surveys have been completed highlighting the use of total lightning information during significant events across the Tennessee Valley. In addition, around 150 specific cases of interest have been archived for collaborative post storm analysis. From these datasets, detailed trending information from radar and total lightning can be compared to corresponding damage reports. This presentation will emphasize

  15. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    Directory of Open Access Journals (Sweden)

    Isidro Calvo

    2016-09-01

    Full Text Available Typical Internet of Things (IoT applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers. The Raspberry Pi platform has become a very interesting choice for IoT applications for several reasons: (1 good computing power/cost ratio; (2 high availability; it has become a de facto hardware standard; and (3 ease of use; it is based on operating systems with a big community of users. In IoT applications, data are frequently carried by means of wireless sensor networks in which energy consumption is a key issue. Energy consumption is especially relevant for smart sensors that are scattered over wide geographical areas and may need to work unattended on batteries for long intervals of time. In this scenario, it is convenient to ease the construction of IoT applications while keeping energy consumption to a minimum at the sensors. This work proposes a possible gateway implementation with specific technologies. It solves the following research question: how to build gateways for IoT applications with Raspberry Pi and low power IQRF communication modules. The following contributions are presented: (1 one architecture for IoT gateways that integrates data from sensor nodes into a higher level application based on low-cost/low-energy technologies; (2 bindings in Java and C that ease the construction of IoT applications; (3 an empirical model that describes the consumption of the communications at the nodes (smart sensors and allows scaling their batteries; and (4 validation of the proposed energy model at the battery-operated nodes.

  16. Fuzzy information & engineering and operations research & management

    CERN Document Server

    Nasseri, Hadi

    2014-01-01

    Fuzzy Information & Engineering and Operations Research & Management is the monograph from submissions by the 6th International Conference on Fuzzy Information and Engineering (ICFIE2012, Iran) and by the 6th academic conference from Fuzzy Information  Engineering Branch of Operation Research Society of China (FIEBORSC2012, Shenzhen,China). It is  published by Advances in Intelligent and Soft Computing (AISC). We have received more than 300 submissions. Each paper of it has undergone a rigorous review process. Only high-quality papers are included in it containing papers as follows: I.                    Programming and Optimization. II.                 Lattice and Measures. III.               Algebras  and Equation. IV.               Forecasting, Clustering and Recognition. V.     Systems and Algorithm. VI.                 Graph and Network. VII. Others.

  17. Dust escape from Io

    Science.gov (United States)

    Flandes, Alberto

    2004-08-01

    The Dust ballerina skirt is a set of well defined streams composed of nanometric sized dust particles that escape from the Jovian system and may be accelerated up to >=200 km/s. The source of this dust is Jupiter's moon Io, the most volcanically active body in the Solar system. The escape of dust grains from Jupiter requires first the escape of these grains from Io. This work is basically devoted to explain this escape given that the driving of dust particles to great heights and later injection into the ionosphere of Io may give the particles an equilibrium potential that allow the magnetic field to accelerate them away from Io. The grain sizes obtained through this study match very well to the values required for the particles to escape from the Jovian system.

  18. IOs as Social Sites

    DEFF Research Database (Denmark)

    Park, Susan M.; Vetterlein, Antje

    for actors with a given identity, which becomes institutionalized and internalized over time. Building on recent work that details how a norm’s strength is also derived from its specificity, the article assesses how the different ways an IO adopts norms may affect the norm’s power. The article provides......Norms research has made significant inroads into examining their emergence and influence in international relations, while recognizing international organizations (IOs) as key social sites for norms to be created and/or disseminated. This paper interrogates how IOs as “organizational platforms......” (Finnemore 1996) influence the norm building process. Going beyond state-centric approaches to norm construction, it argues that the process of taking up a norm by an IO does affect the norm’s power. A norm’s strength is determined by the extent to which it is uncontested and taken for granted as appropriate...

  19. Io in Eclipse

    Science.gov (United States)

    2007-01-01

    This unusual image shows Io glowing in the darkness of Jupiter's shadow. It is a combination of eight images taken by the New Horizons Long Range Reconnaissance Imager (LORRI) between 14:25 and 14:55 Universal Time on February 27, 2007, about 15 hours before the spacecraft's closest approach to Jupiter. North is at the top of the image. Io's surface is invisible in the darkness, but the image reveals glowing hot lava, auroral displays in Io's tenuous atmosphere and volcanic plumes across the moon. The three bright points of light on the right side of Io are incandescent lava at active volcanoes - Pele and Reiden (south of the equator), and a previously unknown volcano near 22 degrees north, 233 degrees west near the edge of the disk at the 2 o'clock position. An auroral glow, produced as intense radiation from Jupiter's magnetosphere bombards Io's atmosphere, outlines the edge of the moon's disk. The glow is patchy because the atmosphere itself is patchy, being denser over active volcanoes. In addition to the near-surface glow, there is a remarkable auroral glow suspended 330 kilometers (200 miles) above the edge of the disk at the 2 o'clock position; perhaps this glowing gas was ejected from the new volcano below it. Another glowing gas plume, above a fainter point of light, is visible just inside Io's disk near the 6 o'clock position; this plume is above another new volcanic eruption discovered by New Horizons. On the left side of the disk, near Io's equator, a cluster of faint dots of light is centered near the point on Io that always faces Jupiter. This is the region where electrical currents connect Io to Jupiter's magnetosphere. It is likely that electrical connections to individual volcanoes are causing the glows seen here, though the details are mysterious. Total exposure time for this image was 16 seconds. The range to Io was 2.8 million kilometers (1.7 million miles), and the image is centered at Io coordinates 7 degrees south, 306 degrees west. The image

  20. Crafting a Usable Microkernel, Processor, and I/O System with Strict and Provable Information Flow Security

    Science.gov (United States)

    2011-01-01

    flow properties of embedded systems. Once the de- sign has been debugged using conventional tools, our abstraction and augmentation tools create a new de...www.lynuxworks.com/solutions/milaero/arinc-653. php . [2] Common criteria for information technology security evaluation. http

  1. Using a layered model to place EW in context within the information sphere

    CSIR Research Space (South Africa)

    Maasdorp, FDV

    2012-11-01

    Full Text Available In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper...

  2. Benchmarking Distributed Stream Processing Platforms for IoT Applications

    OpenAIRE

    Shukla, Anshu; Simmhan, Yogesh

    2016-01-01

    Internet of Things (IoT) is a technology paradigm where millions of sensors monitor, and help inform or manage, physical, envi- ronmental and human systems in real-time. The inherent closed-loop re- sponsiveness and decision making of IoT applications makes them ideal candidates for using low latency and scalable stream processing plat- forms. Distributed Stream Processing Systems (DSPS) are becoming es- sential components of any IoT stack, but the efficacy and performance of contemporary DSP...

  3. Tracing where IoT data are collected and aggregated

    OpenAIRE

    Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio

    2016-01-01

    The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart objects that automatically collect and exchange data of various kinds, directly gathered from sensors or generated by aggregations. Suitable coordination primitives and analysis mechanisms are in order to design and reason about IoT systems, and to intercept the implied technological shifts. We address these issues from a foundational point of view. To study them, we define IoT-LySa, a process ca...

  4. Io in Eclipse 2

    Science.gov (United States)

    2007-01-01

    This image of Io eclipsed by Jupiter's shadow is a combination of several images taken by the New Horizons Long Range Reconnaissance Imager (LORRI) between 09:35 and 09:41 Universal Time on February 27, 2007, about 28 hours after the spacecraft's closest approach to Jupiter. North is at the top of the image. In the darkness, only glowing hot lava, auroral displays in Io's tenuous atmosphere and the moon's volcanic plumes are visible. The brightest points of light in the image are the glow of incandescent lava at several active volcanoes. The three brightest volcanoes south of the equator are, from left to right, Pele, Reiden and Marduk. North of the equator, near the disk center, a previously unknown volcano near 22 degrees north, 233 degrees west glows brightly. (The dark streak to its right is an artifact.) The edge of Io's disk is outlined by the auroral glow produced as intense radiation from Jupiter's magnetosphere bombards the atmosphere. The glow is patchy because the atmosphere itself is patchy, being denser over active volcanoes. At the 1 o'clock position the giant glowing plume from the Tvashtar volcano rises 330 kilometers (200 miles) above the edge of the disk, and several smaller plumes are also visible as diffuse glows scattered across the disk. Bright glows at the edge of Io on the left and right sides of the disk mark regions where electrical currents connect Io to Jupiter's magnetosphere. New Horizons was 2.8 million kilometers (1.7 million miles) from Io when this picture was taken, and the image is centered at Io coordinates 2 degrees south, 238 degrees west. The image has been heavily processed to remove scattered light from Jupiter, but some artifacts remain, including a horizontal seam where two sets of frames were pieced together. Total exposure time for this image was 56 seconds.

  5. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  6. I/O Performance Characterization of Lustre and NASA Applications on Pleiades

    Science.gov (United States)

    Saini, Subhash; Rappleye, Jason; Chang, Johnny; Barker, David Peter; Biswas, Rupak; Mehrotra, Piyush

    2012-01-01

    In this paper we study the performance of the Lustre file system using five scientific and engineering applications representative of NASA workload on large-scale supercomputing systems such as NASA s Pleiades. In order to facilitate the collection of Lustre performance metrics, we have developed a software tool that exports a wide variety of client and server-side metrics using SGI's Performance Co-Pilot (PCP), and generates a human readable report on key metrics at the end of a batch job. These performance metrics are (a) amount of data read and written, (b) number of files opened and closed, and (c) remote procedure call (RPC) size distribution (4 KB to 1024 KB, in powers of 2) for I/O operations. RPC size distribution measures the efficiency of the Lustre client and can pinpoint problems such as small write sizes, disk fragmentation, etc. These extracted statistics are useful in determining the I/O pattern of the application and can assist in identifying possible improvements for users applications. Information on the number of file operations enables a scientist to optimize the I/O performance of their applications. Amount of I/O data helps users choose the optimal stripe size and stripe count to enhance I/O performance. In this paper, we demonstrate the usefulness of this tool on Pleiades for five production quality NASA scientific and engineering applications. We compare the latency of read and write operations under Lustre to that with NFS by tracing system calls and signals. We also investigate the read and write policies and study the effect of page cache size on I/O operations. We examine the performance impact of Lustre stripe size and stripe count along with performance evaluation of file per process and single shared file accessed by all the processes for NASA workload using parameterized IOR benchmark.

  7. Understanding IO patterns and performance of CMS Data Analysis across T2s worldwide

    CERN Document Server

    Sala, Leonardo

    2010-01-01

    We discuss the IO patterns and performance of CMS Data Analysis based on measurements on "the bench" as well as operational observations during the initial LHC data taking period. It was observed the default I/O settings for CMS data analysis resulted in poor CPU efficiency and high I/O load at many T2 sites. This effort developed tools to measure CMSSW I/O performance for grid-based analysis. Our work enabled CMSSW developers to understand how new I/O strategies work across the full range of deployed T2 storage solutions. We discuss our results, based upon aggregate I/O statistics collected worldwide.

  8. Information Operations: The Need for a National Strategy

    Science.gov (United States)

    2002-06-01

    Counter-Propaganda Network Management Computer Network Exploitation Special Information Operations 14 flexible, scalable and adaptable to...Computer Security Physical Attack/Destruction Counter-Propaganda Network Management Computer Network Exploitation Special Information Operations...capability is special information operations (SIO). The only published definition or description of an SIO is found in Joint Publication 1-02. It is

  9. Review on open source operating systems for internet of things

    Science.gov (United States)

    Wang, Zhengmin; Li, Wei; Dong, Huiliang

    2017-08-01

    Internet of Things (IoT) is an environment in which everywhere and every device became smart in a smart world. Internet of Things is growing vastly; it is an integrated system of uniquely identifiable communicating devices which exchange information in a connected network to provide extensive services. IoT devices have very limited memory, computational power, and power supply. Traditional operating systems (OS) have no way to meet the needs of IoT systems. In this paper, we thus analyze the challenges of IoT OS and survey applicable open source OSs.

  10. Compare The Advantages And Disadvantages iOS And Android Operating Systems%iOS与Android操作系统的优缺点比较

    Institute of Scientific and Technical Information of China (English)

    孙晓文

    2013-01-01

    Android and iOS development has been the integration of the interface has a tendency, both sides are carrying each other, has been difficult to say who is more competitive than anyone else. Development of Android system features to attract more developers to its development. The attendant was sucked charge mobile phone viruses and malicious software at the expense of the Android mobile phone users. However, the advantage of making relatively inexpensive Android's market share is much higher than iOS. The iOS closed system can bring more security guarantees, but users have to face constraints and system applications using some of the inconveniences of choice.%Android和iOS发展至今已经有着界面融合的趋势,双方都在进行取长补短,已经很难说谁比谁更为优秀。Android系统的开发性特点更能够吸引开发者对其进行开发。而随之带来的是手机病毒和恶意吸费软件在损害着Android手机的用户。但是相对较为廉价的优势使得Android的市场占有率远远高于iOS。而iOS封闭的系统能够带来更为安全的保证,但是用户不得不面对应用选择的制约以及系统使用中的一些不便。

  11. Object‐Oriented RFID with IoT: A Design Concept of  Information Systems in Manufacturing

    Directory of Open Access Journals (Sweden)

    Tamotsu Kamigaki

    2017-02-01

    Full Text Available The Internet of Things (IoT has increasingly become important in industry. Connectivity  over the internet of not only people but also devices (such as sensors, appliances, machines, robots,  and vehicles is leading to a paradigm shift in manufacturing. The Japanese government recognizes  this and has stated that IoT connectivity and the methodologies to exploit it are paramount for  Japanese  industry.  Currently,  the  necessary  changes  have  been  realized  in  large  Japanese  companies;  however,  implementation  in  smaller  companies  has  been  lagging,  despite  the  advantages of introducing IoT technologies, due to the high cost. The objective of this research is to  suggest a design concept which combines IoT and object‐oriented radio frequency identification  (RFID.  IoT technology is  used for  collecting, analyzing, and managing data, and an object‐oriented  RFID  system  is used  as a control  process in manufacturing  systems.  In previous research,  the objectoriented  RFID system  was shown to provide  flexible management through the use of a variety of  OORFID tags. The current research extends this by introducing object‐oriented RFID into IoT  systems to  improve  the  flexibility  in the  manufacturing systems. For the verification of this concept,  an experimental IoT system using object‐oriented  RFID was  designed  and  implemented

  12. Pseudo-random unitary operators for quantum information processing.

    Science.gov (United States)

    Emerson, Joseph; Weinstein, Yaakov S; Saraceno, Marcos; Lloyd, Seth; Cory, David G

    2003-12-19

    In close analogy to the fundamental role of random numbers in classical information theory, random operators are a basic component of quantum information theory. Unfortunately, the implementation of random unitary operators on a quantum processor is exponentially hard. Here we introduce a method for generating pseudo-random unitary operators that can reproduce those statistical properties of random unitary operators most relevant to quantum information tasks. This method requires exponentially fewer resources, and hence enables the practical application of random unitary operators in quantum communication and information processing protocols. Using a nuclear magnetic resonance quantum processor, we were able to realize pseudorandom unitary operators that reproduce the expected random distribution of matrix elements.

  13. Silicon Tetrafluoride on Io

    CERN Document Server

    Schaefer, L; Schaefer, Laura

    2005-01-01

    Silicon tetrafluoride (SiF4) is observed in terrestrial volcanic gases and is predicted to be the major F - bearing species in low temperature volcanic gases on Io (Schaefer and Fegley, 2005b). SiF4 gas is also a potential indicator of silica-rich crust on Io. We used F/S ratios in terrestrial and extraterrestrial basalts, and gas/lava enrichment factors for F and S measured at terrestrial volcanoes to calculate equilibrium SiF4/SO2 ratios in volcanic gases on Io. We conclude that SiF4 can be produced at levels comparable to the observed NaCl/SO2 gas ratio. We also considered potential loss processes for SiF4 in volcanic plumes and in Io's atmosphere including ion-molecule reactions, electron chemistry, photochemistry, reactions with the major atmospheric constituents, and condensation. Photochemical destruction (tchem ~ 266 days) and/or condensation as Na2SiF6 (s) appear to be the major sinks for SiF4. We recommend searching for SiF4 with infrared spectroscopy using its 9.7 micron band as done on Earth.

  14. IO and OI. I

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Schmidt, Erik Meineche

    1977-01-01

    A fixed-point characterization of the inside-out (IO) and outside-in (OI) context-free tree languages is given. This characterization is used to obtain a theory of nondeterministic systems of context-free equations with parameters. Several “Mezei-and-Wright-like” results are obtained which relate...

  15. 75 FR 47631 - Swets Information Services, Operations Department, Information Technology Group, Marketing Group...

    Science.gov (United States)

    2010-08-06

    ... Technology Group, Marketing Group, Finance Group, Runnemede, NJ; Amended Certification Regarding Eligibility... investigation combined the Operations Department, Information Technology (IT) Group, Marketing Group and the... Information Services, Operations Department, Information Technology Group, Marketing Group, and......

  16. Geologic map of Io

    Science.gov (United States)

    Williams, David A.; Keszthelyi, Laszlo P.; Crown, David A.; Yff, Jessica A.; Jaeger, Windy L.; Schenk, Paul M.; Geissler, Paul E.; Becker, Tammy L.

    2011-01-01

    Io, discovered by Galileo Galilei on January 7–13, 1610, is the innermost of the four Galilean satellites of the planet Jupiter (Galilei, 1610). It is the most volcanically active object in the Solar System, as recognized by observations from six National Aeronautics and Space Administration (NASA) spacecraft: Voyager 1 (March 1979), Voyager 2 (July 1979), Hubble Space Telescope (1990–present), Galileo (1996–2001), Cassini (December 2000), and New Horizons (February 2007). The lack of impact craters on Io in any spacecraft images at any resolution attests to the high resurfacing rate (1 cm/yr) and the dominant role of active volcanism in shaping its surface. High-temperature hot spots detected by the Galileo Solid-State Imager (SSI), Near-Infrared Mapping Spectrometer (NIMS), and Photopolarimeter-Radiometer (PPR) usually correlate with darkest materials on the surface, suggesting active volcanism. The Voyager flybys obtained complete coverage of Io's subjovian hemisphere at 500 m/pixel to 2 km/pixel, and most of the rest of the satellite at 5–20 km/pixel. Repeated Galileo flybys obtained complementary coverage of Io's antijovian hemisphere at 5 m/pixel to 1.4 km/pixel. Thus, the Voyager and Galileo data sets were merged to enable the characterization of the whole surface of the satellite at a consistent resolution. The United States Geological Survey (USGS) produced a set of four global mosaics of Io in visible wavelengths at a spatial resolution of 1 km/pixel, released in February 2006, which we have used as base maps for this new global geologic map. Much has been learned about Io's volcanism, tectonics, degradation, and interior since the Voyager flybys, primarily during and following the Galileo Mission at Jupiter (December 1995–September 2003), and the results have been summarized in books published after the end of the Galileo Mission. Our mapping incorporates this new understanding to assist in map unit definition and to provide a global synthesis

  17. Io. [theories concerning volcanic activity

    Science.gov (United States)

    Johnson, T. V.; Soderblom, L. A.

    1983-01-01

    A report on the continuing investigation of Io is presented. Gravitational resonance is discussed as the cause of Io's volcanism, and the volcanic activity is explained in terms of sulfur chemistry. Theories concerning the reasons for the two main types of volcanic eruptions on Io are advanced and correlated with geographical features of the satellite. The sulfur and silicate models of the calderas are presented, citing the strengths and weaknesses of each. Problems of the gravitational resonance theory of Io's heat source are then described. Finally, observations of Io planned for the Galileo mission are summarized.

  18. iOS app development portable genius

    CERN Document Server

    Wentk, Richard

    2012-01-01

    The essential skills and technologies needed for iOS development in one handy guide! The unprecedented popularity of iOS devices, such as the iPhone, iPad, and iPod touch, has led to a development boom. If you’re eager to become part of the action, then this is the book for you! Packed with must-have information on iOS development, this handy guide covers Objective-C, Xcode, Frameworks, and sound design principles and explains how to upload an app to the app store and integrate apps with the latest advances that Apple offers developers. The featured tips and tricks will get you up and ru

  19. Object‐Oriented RFID with IoT: A Design Concept of  Information Systems in Manufacturing

    OpenAIRE

    Tamotsu Kamigaki

    2017-01-01

    The Internet of Things (IoT) has increasingly become important in industry. Connectivity  over the internet of not only people but also devices (such as sensors, appliances, machines, robots,  and vehicles) is leading to a paradigm shift in manufacturing. The Japanese government recognizes  this and has stated that IoT connectivity and the methodologies to exploit it are paramount for  Japanese  industry.  Currently,  the  necessary  changes  have  been  realized  in  large  Japanese  compani...

  20. An analysis of I/O efficient order-statistic-based techniques for noise power estimation in the HRMS sky survey's operational system

    Science.gov (United States)

    Zimmerman, G. A.; Olsen, E. T.

    1992-01-01

    Noise power estimation in the High-Resolution Microwave Survey (HRMS) sky survey element is considered as an example of a constant false alarm rate (CFAR) signal detection problem. Order-statistic-based noise power estimators for CFAR detection are considered in terms of required estimator accuracy and estimator dynamic range. By limiting the dynamic range of the value to be estimated, the performance of an order-statistic estimator can be achieved by simpler techniques requiring only a single pass of the data. Simple threshold-and-count techniques are examined, and it is shown how several parallel threshold-and-count estimation devices can be used to expand the dynamic range to meet HRMS system requirements with minimal hardware complexity. An input/output (I/O) efficient limited-precision order-statistic estimator with wide but limited dynamic range is also examined.

  1. Operator calculus for information field theory.

    Science.gov (United States)

    Leike, Reimar H; Enßlin, Torsten A

    2016-11-01

    Signal inference problems with non-Gaussian posteriors can be hard to tackle. Through using the concept of Gibbs free energy these posteriors are rephrased as Gaussian posteriors for the price of computing various expectation values with respect to a Gaussian distribution. We present a way of translating these expectation values to a language of operators which is similar to that in quantum mechanics. This simplifies many calculations, for instance such as those involving log-normal priors. The operator calculus is illustrated by deriving a self-calibrating algorithm which is tested with mock data.

  2. Operator calculus for information field theory

    Science.gov (United States)

    Leike, Reimar H.; Enßlin, Torsten A.

    2016-11-01

    Signal inference problems with non-Gaussian posteriors can be hard to tackle. Through using the concept of Gibbs free energy these posteriors are rephrased as Gaussian posteriors for the price of computing various expectation values with respect to a Gaussian distribution. We present a way of translating these expectation values to a language of operators which is similar to that in quantum mechanics. This simplifies many calculations, for instance such as those involving log-normal priors. The operator calculus is illustrated by deriving a self-calibrating algorithm which is tested with mock data.

  3. A General SDN-Based IoT Framework with NVF Implementation

    Institute of Scientific and Technical Information of China (English)

    Jie Li; Eitan Altman; Corinne Touati

    2015-01-01

    The emerging technologies of Internet of Things (IoT), soft⁃ware defined networking (SDN), and network function virtual⁃ization (NFV) have great potential for the information service innovation in the cloud and big data era. The architecture models of IoT, SDN with NFV implementation are studied in this paper. A general SDN⁃based IoT framework with NFV implantation is presented. This framework takes advantages of SDN and NFV and improves IoT architecture.

  4. Construction Operations Building Information Exchange (COBIE)

    Science.gov (United States)

    2007-06-01

    the Business Process Modeling Notation ( BPMN ) [Object Modeling Group 2006], was used to capture the steps relevant to COBIE. Information ex- ERDC...Construction Research Workshop, Stanford, California. Object Modeling Group. 2006. Business Process Modeling Notation ( BPMN ) Specification. Final

  5. The Future of Information Operations in the United States Army

    Science.gov (United States)

    2007-01-01

    as Marketing Marketing tools and concepts could generate support for coalition military operations just as an advertiser promoting a commercial...military, the advanced application of marketing tools to leverage humanitarian assistance and public affairs within an Information Operations plan

  6. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    National Research Council Canada - National Science Library

    Calvo, Isidro; Gil-García, José; Recio, Igor; López, Asier; Quesada, Jerónimo

    2016-01-01

    Typical Internet of Things (IoT) applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers...

  7. Remote I/O : fast access to distant storage.

    Energy Technology Data Exchange (ETDEWEB)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  8. US Army War College Information Operations Primer

    Science.gov (United States)

    2009-11-01

    indicators to foreign audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments...International Transformation Conference, June 3, 2009). 5 Cebrowski, 7. 6 Magnus Ekman et al., An In-Depth Look at Computer Performance Growth, Technical...desire or other mental factors to promote specific emotions , attitudes or behaviors. The ultimate objective of U.S. military psychological operations is

  9. Supplemental Information Source Document Balance of Operations

    Energy Technology Data Exchange (ETDEWEB)

    Herring, Allen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-12-01

    This document presents information relevant to the development of a Site-Wide Environmental Impact Statement for Sandia National Laboratories/New Mexico that is not captured in other Source Documents. Specifically, it covers Research and Development activities, Environmental Programs, Infrastructure and Utilities, Maintenance, Materials Management, and Decontamination and Demolition.

  10. Tactical Information Operations in Contemporary COIN Campaigns

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    Dette Research Paper omhandler hvordan det moderne informationsmiljø påvirker oprørsbekæmpelsesoperationer i dag, og hvordan Informations Operationer (INFO OPS) understøtter oprørsbekæmpelsesoperationer på det taktiske niveau. Research Paperet ser endvidere på hvilke teknikker og kapaciteter der...

  11. Agile Information System Supporting Virtual Enterprise Operation

    Institute of Scientific and Technical Information of China (English)

    许青松; 陶丹; 范玉顺

    2001-01-01

    Dynamic collaboration is a relationship of companies working together for mutual benefit to bring acomplementary set of competencies to gain a market opportunity. A mechanism to manage and controlinformation flow among collaborating partners is described in this paper. Analysis of the virtual informationsystem requirements was used to develop an agile manufacturing information system (AMIS) to create, sustainand dissolve a virtual enterprise.``

  12. OPERATIONS RESEARCH IN THE DESIGN OF MANAGEMENT INFORMATION SYSTEMS

    Science.gov (United States)

    The design of management information systems is concerned with the identification and detailed specification of the information and data processing... information systems in which mathematical models are employed as the basis for analysis and systems design. Operations research provides a natural...of advanced data processing techniques in management information systems today, the close coordination of operations research and data systems activities has become a practical necessity for the modern business firm.

  13. Challenge and Methods of Synchronous Disk I/O

    Institute of Scientific and Technical Information of China (English)

    靳超; 郑纬民; 汪东升; 毛昀

    2004-01-01

    At present, I/O is the performance bottleneck limiting the speed of computer systems. A large number of I/O operations are synchronous read/write operations of only small data blocks. However, reducing the latency of synchronous I/O operation is a non-trivial problem. In this paper, we propose two methods to address this problem. The first method, FastSync, uses a cache disk optimized for write operation via use of a disk-head position prediction algorithm. In this way, disk capacity is traded for synchronous I/O performance.The second method, LND, uses free memory capacity in a network environment as a cache disk for the buffering of synchronous I/O operation. Data integrity in FastSync is ensured by using a data log on the cache disk, whereas in LND, integrity is ensured by the storage in distributed memory of multiple copies of each data block. Both methods succeed in dramatically increasing the performance of synchronous I/O operation. The performance of LND is limited by the network speed, whereas performance of FastSync is determined mostly by the data block size.

  14. Information processing in convex operational theories

    Energy Technology Data Exchange (ETDEWEB)

    Barnum, Howard Nelch [Los Alamos National Laboratory; Wilce, Alexander G [SUSQUEHANNA UNIV

    2008-01-01

    In order to understand the source and extent of the greater-than-classical information processing power of quantum systems, one wants to characterize both classical and quantum mechanics as points in a broader space of possible theories. One approach to doing this, pioneered by Abramsky and Coecke, is to abstract the essential categorical features of classical and quantum mechanics that support various information-theoretic constraints and possibilities, e.g., the impossibility of cloning in the latter, and the possibility of teleportation in both. Another approach, pursued by the authors and various collaborators, is to begin with a very conservative, and in a sense very concrete, generalization of classical probability theory--which is still sufficient to encompass quantum theory--and to ask which 'quantum' informational phenomena can be reproduced in this much looser setting. In this paper, we review the progress to date in this second programme, and offer some suggestions as to how to link it with the categorical semantics for quantum processes developed by Abramsky and Coecke.

  15. TMACS I/O termination point listing. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Scaief, C.C. III

    1994-09-13

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point`s unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings.

  16. Dviračio rato dinamikos registravimo įrenginys

    OpenAIRE

    Kondrotas, Edvardas

    2011-01-01

    Įrenginys skirtas dviračio padangos standumo ir slopinimo charakteristikų tyrimams ir jos efektinio kelio profilio aukščio tyrimams. Šiems tyrimams reikalingas vienas akselerometras tvirtinamas ant rato ašies. Taip pat numatyta galimybė padidinti akselerometrų skaičių, kitų dviračio mazgų tyrimams. Bicycle wheel dynamic recording device microcontroller PIC18F46J50 basis, who accepts information from four analogous ADXL326 and four digital ADXL345 accelerometers and this information transmi...

  17. Io's Diverse Styles of Volcanic Activity: Results from Galileo NIMS

    Science.gov (United States)

    Lopes, R. M. C.; Smythe, W. D.; Kamp, L. W.; Doute, S.; Carlson, R.; McEwen, A.; Geissler, P.

    2001-01-01

    Observations by Galileo's Near-Infrared Mapping Spectrometer were used to map the thermal structure of several of Io's hot spots, revealing different styles of volcanism Additional information is contained in the original extended abstract..

  18. Service function value based IoT information service composition%基于服务功能价值的物联网信息服务组合

    Institute of Scientific and Technical Information of China (English)

    杨臻; 李德识

    2015-01-01

    为解决物联网信息服务需求,提出一种基于功能价值择优的信息服务组合方法。结合物联网中设备资源受限、数据信息与地理位置密切相关的特点,建立物联网QoS模型;利用服务功能关键词在Google知识库中的索引数目,定量表征各功能的相对重要性;在此基础上,从功能价值与服务质量(quality of service,QoS)两方面评价候选服务,采用改进的遗传算法在可行服务组合空间中全局寻优。实验结果表明,该方法在用户预算有限时能有效搜索到更符合用户需求的组合方案,优先保留用户关注的数据信息。%To solve the demands of information service in internet of things (IoT),a function value based method of IoT service composition was proposed.Considering sensory device resource constraints and the close relation between geographical position and sensory data,the QoS in IoT was modeled.The function value representing the Google hit number was defined as the rela-tive importance of individual service.On this basis,each individual candidate service was evaluated using both the QoS and the inherent service function value,and the efficiency enhanced genetic algorithm was used as the global optimization method of ser-vice composition.The experimental results show that the proposed optimization method is more feasible and effective for solving IoT information service composition problem.Under the user budget,the sensory data which the user more interested in is pre-served in priority.

  19. Digital cartography of Io

    Science.gov (United States)

    Mcewen, Alfred S.; Duck, B.; Edwards, Kathleen

    1991-01-01

    A high resolution controlled mosaic of the hemisphere of Io centered on longitude 310 degrees is produced. Digital cartographic techniques were employed. Approximately 80 Voyager 1 clear and blue filter frames were utilized. This mosaic was merged with low-resolution color images. This dataset is compared to the geologic map of this region. Passage of the Voyager spacecraft through the Io plasma torus during acquisition of the highest resolution images exposed the vidicon detectors to ionized radiation, resulting in dark-current buildup on the vidicon. Because the vidicon is scanned from top to bottom, more charge accumulated toward the bottom of the frames, and the additive error increases from top to bottom as a ramp function. This ramp function was removed by using a model. Photometric normalizations were applied using the Minnaert function. An attempt to use Hapke's photometric function revealed that this function does not adequately describe Io's limb darkening at emission angles greater than 80 degrees. In contrast, the Minnaert function accurately describes the limb darkening up to emission angles of about 89 degrees. The improved set of discrete camera angles derived from this effort will be used in conjunction with the space telemetry pointing history file (the IPPS file), corrected on 4 or 12 second intervals to derive a revised time history for the pointing of the Infrared Interferometric Spectrometer (IRIS). For IRIS observations acquired between camera shutterings, the IPPS file can be corrected by linear interpolation, provided that the spacecraft motions were continuous. Image areas corresponding to the fields of view of IRIS spectra acquired between camera shutterings will be extracted from the mosaic to place the IRIS observations and hotspot models into geologic context.

  20. Cisco IOS Cookbook

    CERN Document Server

    Dooley, Kevin

    2008-01-01

    Thoroughly revised and expanded, Cisco IOS Cookbook, 2nd Edition, adds sections on MPLS, Security, IPv6, and IP Mobility, and presents solutions to the most common configuration problems. If you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you're experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you're not experienced--if you've just been given responsibility for managing a network with Cisco routers--this book could be a job-saver.

  1. IO and OI. II

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Schmidt, Erik Meineche

    1978-01-01

    In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra....... In this part we shall use these results to obtain a theory of systems of context-free equations over arbitrary continuous algebras. We refer to the Introduction of Part 1 for a description of the contents of this part....

  2. Java I/O

    CERN Document Server

    Harold, Elliotte Rusty

    2006-01-01

    All of Java's Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java provides many different kinds of streams, each with its own application. The universe of streams is divided into four largecategories: input streams and output streams, for reading and writing binary data; and readers and writers, for reading and writing textual (character) data. You're almost certainly familiar with the basic kinds of streams--but did you know that there's a CipherInputStream for reading encrypted data? And a ZipOutputStream for automati

  3. OS X and iOS Kernel Programming

    CERN Document Server

    Halvorsen, Ole Henry

    2011-01-01

    OS X and iOS Kernel Programming combines essential operating system and kernel architecture knowledge with a highly practical approach that will help you write effective kernel-level code. You'll learn fundamental concepts such as memory management and thread synchronization, as well as the I/O Kit framework. You'll also learn how to write your own kernel-level extensions, such as device drivers for USB and Thunderbolt devices, including networking, storage and audio drivers. OS X and iOS Kernel Programming provides an incisive and complete introduction to the XNU kernel, which runs iPhones, i

  4. Medical Information Technology in Support of the Operational Commander.

    Science.gov (United States)

    2007-11-02

    There are numerous factors that have driven the. need for medical information technology in the operational setting. Two of the primary driving...through retirement. The FHP strategy thrusts preventive medicine and information technology into the forefront of operational health support...paper will deal with the medical information technology portion of the Force Health Protection program. This paper will discuss the pros and cons of

  5. Transformation of Operations Management through Information Technology and Information System in Suning

    Institute of Scientific and Technical Information of China (English)

    SHEN Houcai; YAN Xiaojun

    2004-01-01

    Information technology and information system today play major roles in companies who are competitive in the global market. In this paper, we will study how Suning Appliance Chain changes her operations by using information technology and information system. Suning's Strategy,operations structure, especially her logistics system are discussed firstly; how information technology and information system support her operation and logistics to gain competitive capabilities are further discussed. Finally, the operation system transformation through IT/IS in Suning is studied by the use of a stochastic inventory model.

  6. Information Technology In Supply Chain Operations: A Road Map ...

    African Journals Online (AJOL)

    Information Technology In Supply Chain Operations: A Road Map To Success. ... map to successful implementation of Information Technology (IT) to Supply Chain ... of critical success factors, the role of IT in SCM and the overall benefits which ... stressing that connecting numerous information systems and integrating data ...

  7. Application of IoT in monitoring and controlling agricultural production

    OpenAIRE

    Marković, Dušan; Koprivica, Ranko; Pešović, Uroš; Randić, Siniša

    2015-01-01

    Internet of Things (IoT) is a concept that allows physical objects with computational and sensory support to connect with each other and access services across the Internet. The IoT idea was introduced to connect devices through the Internet and facilitate access to information for users. The wide range of potential applications of IoT also includes agriculture, where extensive use of IoT is expected in the future. The aim of this work was to present the IoT concept as a basis for monitoring ...

  8. Application of IoT in monitoring and controlling agricultural production

    OpenAIRE

    Marković Dušan; Koprivica Ranko; Pešović Uroš; Randić Siniša

    2015-01-01

    Internet of Things (IoT) is a concept that allows physical objects with computational and sensory support to connect with each other and access services across the Internet. The IoT idea was introduced to connect devices through the Internet and facilitate access to information for users. The wide range of potential applications of IoT also includes agriculture, where extensive use of IoT is expected in the future. The aim of this work was to present the IoT concept as a basis for monitoring ...

  9. Weighted E-Spaces and Epistemic Information Operators

    Directory of Open Access Journals (Sweden)

    Mark Burgin

    2014-06-01

    Full Text Available Information is usually related to knowledge. Here, we present a broader picture in which information is associated with epistemic structures, which form cognitive infological systems as basic recipients and creators of cognitive information. Infological systems are modeled by epistemic spaces, while operators in these spaces are mathematical models of information. Information that acts on epistemic structures is called cognitive information, while information that acts on knowledge structures is called epistemic information. The latter brings new and updates existing knowledge, being of primary importance to people. In this paper, both types of information are studied as operators in epistemic spaces based on the general theory of information. As a synthetic approach, which reveals the essence of information, organizing and encompassing all main directions in information theory, the general theory of information provides efficient means for such a study. Different types of information dynamics representation use tools from various mathematical disciplines, such as the theory of categories, functional analysis, mathematical logic and algebra. In this paper, we base our exploration of information and knowledge dynamics on functional analysis further developing the mathematical stratum of the general theory of information.

  10. A Security Application of IoT——Design of Information Equipment Intelligent Warehouse%一种物联网的安全应用——信息装备智慧仓库设计

    Institute of Scientific and Technical Information of China (English)

    冯彩红

    2011-01-01

    面对物联网的大势所趋,提出了一种物联网的安全应用:信息装备智慧仓库,为军队、党政或企事业单位的重要信息装备保障提供一种智能化的保障手段。这里以军事信息装备管理为例,从安全信息装备入库管理、出库管理、远程维护支持和安全防护等多个环节阐述了系统功能,并进行了初步设想。以"装备感知,智慧管理"为目标,提供一套全新的安全信息装备保障和管理手段。%Facing the irresistible trend of IoT(the Internet of Things),a security application of IoT is proposed,that is,Information Equipment Intelligence Warehouse. This warehouse provides a kind of intelligent assurance means for the important information equipments of the army,Party and Government,enterprises or business units. With military equipment information management as an example,this paper discusses the system functions,including entering or exiting warehouse management,remote maintenance support and safety protection of the security information and equipments. In order to achieve the goal of "equipment-aware,intelligent management" a new set of assurance and management means for security and information equipments are provided.

  11. UCH 3 and 4 plant computer system I/O point summary

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Lee, Tae Hoon; Lee, Soon Sung; Lee, Byung Chae; Yoon, Jong Keon; Park, Jeong Suk; Baek, Seung Min; Shin, Hyun Kook [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1996-05-01

    This technical report summarizes the UCN 3 and 4 I/O database points and is expected to be an important for many disciplines. There are several kind of plant tests before the commercial operation such as Preoperational Test, Cold Hydro Test (CHT), Hot Functional Test (HFT), and Power Ascension Test (PAT). Those are performed in a manner that the validity of the sensor inputs got to the Plant Computer System (PCS) and operational integrity of plant are determined by monitoring the addressable I/O point identification (PID) on the Plant Computer System operator console. For better performance of activities like Emergency Operating Procedure (EOP) computerization, Safety Parameter Display System (SPDS) development, and organizing integrated database for NSSS, referencing the past plant information about I/O database is highly expected. What`s more, it is inevitable material for plant system research and general design document work to be done in future. So we present this report based on UCN database for better understanding of plant computer system. 5 refs. (Author) .new.

  12. Io Eclipse Montage

    Science.gov (United States)

    2007-01-01

    New Horizons took this montage of images of Jupiter's volcanic moon Io, glowing in the dark of Jupiter's shadow, as the Pluto-bound spacecraft sped through the Jupiter system on Feb. 27, 2007. (A): In this picture from the Long-Range Reconnaissance Imager (LORRI), dark blotches and straight lines are artifacts. The brightest spots (including the volcanoes Pele [P] and East Girru [EG]) are incandescent lava from active volcanoes. The more diffuse glows, and the many faint spots, are from gas in the plumes and atmosphere, glowing due to bombardment by plasma in Jupiter's magnetosphere, in a display similar to the Earth's aurorae. (B): The same image with a latitude/longitude grid, showing that the cluster of faint spots is centered near longitude 0 degrees, the point on Io that faces Jupiter. The image also shows the locations of the plumes seen in sunlit images (indicated by red diamonds), which glow with auroral emission in eclipse. (C): Simulated sunlit view of Io with the same geometry, based on sunlit LORRI images. (D): A combination of the sunlit image (in cyan) and the eclipse image (in red), showing that all point-like glows in the eclipse image arise from dark volcanoes in the eclipse image. (E): This infrared image, at a wavelength of 2.3 microns, obtained by New Horizons Linear Etalon Spectral Imaging Array (LEISA) an hour after the LORRI image, showing thermal emission from active volcanoes. Elongation of the hot spots is an artifact. (F): Combined visible albedo (cyan) and LEISA thermal emission (red) image, showing the sources of the volcanic emission. That most of the faint point-like glows near longitude zero, seen in visible light in images A, B, and D, do not appear in the infrared view of volcanic heat radiation, is one reason scientists believe that these glows are due to auroral emission, not heat radiation. This image appears in the Oct. 12, 2007, issue of Science magazine, in a paper by John Spencer, et al.

  13. Red Team Operations to Assess Information Technology Vulnerabilities

    NARCIS (Netherlands)

    Veltman, M.; Parker, R.L.

    1999-01-01

    All Information and Communication Technology (ICT) systems have vulnerabilities. Weaknesses in these systems are introduced either during the specification, implementation or operational phase. Leaving aside these introduced vulnerabilities are intentional or unintentional, the fact remains that the

  14. The operation criteria of a health management information system ...

    African Journals Online (AJOL)

    The operation criteria of a health management information system. ... Subjects: Forty (40) healthcare workers who were involved in the ... in KNH was performance 17 (53.1%), Other indicators that were commonly applied in HMIS evaluation in ...

  15. An information theory-based approach to modeling the information processing of NPP operators

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jong Hyun; Seong, Poong Hyun [Korea Advanced Institute, Taejon (Korea, Republic of)

    2002-08-01

    This paper proposes a quantitative approach to modeling the information processing of NPP operators. The aim of this work is to derive the amount of the information processed during a certain control task. The focus will be on i) developing a model for information processing of NPP operators and ii) quantifying the model. To resolve the problems of the previous approaches based on the information theory, i.e. the problems of single channel approaches, we primarily develop the information processing model having multiple stages, which contains information flows. Then the uncertainty of the information is quantified using the Conant's model, a kind of information theory.

  16. Analysis of Informal Credit Operations among Farmers In Atisbo ...

    African Journals Online (AJOL)

    The study explored the operations, (savings and loan procurement), as well as ... of the informal financial institutions in ATISBO Local Government Area of Oyo ... of group members, unsynchronized contributions to savings due to non-aligned ... into the operations of the Community Banks through the mobile rural banking ...

  17. Functional Categories of Support to Operations in Military Information Systems

    CERN Document Server

    Tolk, Andreas

    2010-01-01

    In order to group the functional requirements for support to operations by modern information systems systematically, the NATO Code of best Practise (COBP) for C2 Assessment defines three domain areas: Battlespace Visualization, Decision Making, and Battle Management Functions. In addition, within an domain overlapping information grid of the information system, necessary functions for assessing and disseminating the information are capsulated. For all three domains, including the overlapping information grid, the respective requirements for functional support have to be met be future command, control, communications, and intelligence (C3I) systems. The paper describes the functional categories of the three domains having been defined for article 5 operations, extends them to meet the requirements for operations other than war (OOTW), and gives some examples how modules of simulation systems can deliver respective support functions. In addition, references defining migration procedures for legacy systems to e...

  18. An IoT application development using IoTSuite

    OpenAIRE

    Chauhan, Saurabh; Patel, Pankesh

    2016-01-01

    Application development in the Internet of Things (IoT) is challenging because it involves dealing with issues that attribute to different life-cycle phases. First, the application logic has to be analyzed and then separated into a set of distributed tasks for an underlying network. Then, the tasks have to be implemented for the specific hardware. Moreover, we take different IoT applications and present development of these applications using IoTSuite. In this paper, we introduce a design and...

  19. DevOps for the Urban IoT

    OpenAIRE

    Moore, John; Kortuem, Gerd; Smith, Andrew; Chowdhury, Niaz; Cavero, Jose; Gooch, Daniel

    2016-01-01

    Choosing the right technologies to build an urban-scale IoT system can be challenging. There is often a focus on low-level architectural details such as the scalability of message handling. In our experience building an IoT information system requires a high-level holistic approach that mixes traditional data collection from vendor-specific cloud backends, together with data collected directly from embedded hardware and mobile devices. Supporting this heterogeneous environment can prove chall...

  20. iOS cloud development dor dummies

    CERN Document Server

    Goldstein, Neal

    2012-01-01

    Want to create robust, data-driven, iOS cloud apps? This book makes it easier! Apple's mobile operating system (iOS) supports iPhones, iPads, iPods and other Apple devices, and while even beginners can now develop apps to run just on these devices themselves, sometimes you want to create an app with more heft. Applications such as live weather reports or multi-player games require a lot of data to be pulled from outside—often from cloud-based Web Services, such as Google or Amazon. This book, written by application development experts Sujee Maniyam and Neal Goldstein, shows you how to we

  1. EDONIO: Extended distributed object network I/O library

    Energy Technology Data Exchange (ETDEWEB)

    D`Azevedo, E.F.; Romine, C.H. [Oak Ridge National Lab., TN (United States). Mathematical Sciences Section

    1995-03-01

    This report describes EDONIO (Extended Distributed Object Network I/O), an enhanced version of DONIO (Distributed Object Network I/O Library) optimized for the Intel Paragon Systems using the new M-ASYNC access mode. DONIO provided fast file I/O capabilities in the Intel iPSC/860 and Paragon distributed memory parallel environments by caching a copy of the entire file in memory distributed across all processors. EDONIO is more memory efficient by caching only a subset of the disk file at a time. DONIO was restricted by the high memory requirements and use of 32-bit integer indexing to handle files no larger than 2 Gigabytes. EDONIO overcomes this barrier by using the extended integer library routines provided by Intel`s NX operating system. For certain applications, EDONIO may show a ten-fold improvement in performance over the native NX I/O routines.

  2. Operator Informational Needs for Multiple Autonomous Small Vehicles

    Science.gov (United States)

    Trujillo, Anna C.; Fan, Henry; Cross, Charles D.; Hempley, Lucas E.; Cichella, Venanzio; Puig-Navarro, Javier; Mehdi, Syed Bilal

    2015-01-01

    With the anticipated explosion of small unmanned aerial vehicles, it is highly likely that operators will be controlling fleets of autonomous vehicles. To fulfill the promise of autonomy, vehicle operators will not be concerned with manual control of the vehicle; instead, they will deal with the overall mission. Furthermore, the one operator to many vehicles is becoming a constant meme with various industries including package delivery, search and rescue, and utility companies. In order for an operator to concurrently control several vehicles, his station must look and behave very differently than the current ground control station instantiations. Furthermore, the vehicle will have to be much more autonomous, especially during non-normal operations, in order to accommodate the knowledge deficit or the information overload of the operator in charge of several vehicles. The expected usage increase of small drones requires presenting the operational information generated by a fleet of heterogeneous autonomous agents to an operator. NASA Langley Research Center's Autonomy Incubator has brought together researchers in various disciplines including controls, trajectory planning, systems engineering, and human factors to develop an integrated system to study autonomy issues. The initial human factors effort is focusing on mission displays that would give an operator the overall status of all autonomous agents involved in the current mission. This paper will discuss the specifics of the mission displays for operators controlling several vehicles.

  3. Research on informational operation application of tactical loitering platform

    Science.gov (United States)

    Wang, Huanhuan; Zhang, Jun; Li, Guoshu; Song, Jinxing; Zhang, Yunhao

    2016-11-01

    The tactical loitering platform, as a multifunctional precision guided weapon, is an important part of constitution of information warfare. Using the combined propulsion system, the flying mode of platform includes supersonic cruise and subsonic loiter. With different loads, the platform is information warfare equipments with functions of region spying, communication control, electronic jamming, target tracking, accurate attack and damage assessment. Also the ability of platform can be enforced by using data link system in the informational operation.

  4. Professional iOS programming

    CERN Document Server

    van de Put, Peter

    2013-01-01

    Hands-on guidance for programming the next generation of iOS apps If you want to create advanced level iOS apps that get noticed in the App Store, start with this expert book. Written by an international software developer and consultant who has delivered winning solutions for clients all over the world, this professional guide helps you build robust, professional iOS apps at a level that satisfies the demands of clients, companies, and your own creativity. The book includes full source code and invaluable insight from the author's extensive experience. Especially helpful are numerous case st

  5. Micromanaging the IoT space

    Science.gov (United States)

    Mayer, Irak Vicarte

    2017-05-01

    The speed of IoT devices currently connected in our daily lives has drastically accelerated in the last couple of years. The lack of standardization, regulation, and an efficient process to integrate these devices to our ecosystem has led to a relaxed security and an ineffective use of the data generated. This paper presents a new approach to the IoT ecosystem management that improves data sharing and security by categorizing and micromanaging the connected devices. The use of micromanaging multiple access points (M2AP) allows the architecture to respond faster and efficiently to events and attacks to the digital hive. The "local beehive"/ "master beehive" approach seals a compromise of delegating tasks and improving the network management capacity. Finally, an efficient data storage and compact reports of the raw information collected can then be transmitted to cloud services for further analysis if required.

  6. iOS 7 programming pushing the limits

    CERN Document Server

    Napier, Rob

    2014-01-01

    Get ready to create killer apps for iPad and iPhone on the new iOS 7! With Apple's introduction of iOS 7, demand for developers who know the new iOS will be high. You need in-depth information about the new characteristics and capabilities of iOS 7, and that's what you'll find in this book. If you have experience with C or C++, this guide will show you how to create amazing apps for iPhone, iPad, and iPod touch. You'll also learn to maximize your programs for mobile devices using iPhone SDK 7.0. Advanced topics such as security services, running on multiple iPlatforms, and local networking w

  7. Jupiter's moon Io

    Science.gov (United States)

    1979-01-01

    This picture shows a special color reconstruction of one of the erupting volcanos on Io discovered by Voyager 1 during its encounter with Jupiter on the 4th and 5th of March. The picture was taken March 4 about 5:00 p.m. from a range of about half a million kilometers showing an eruption region on the horizon. This method of color analysis allows scientists to combine data from four pictures, taken in ultraviolet, blue, green and orange light. In this picture one can see the strong change in color of the erupting plume. The region that is brighter in ultraviolet light (blue in this image) is much more extensive than the denser, bright yellow region near the center of the eruption. Scientists will use data of this type to study the amount of gas and dust in the eruption and the size of dust particles. Preliminary analysis suggests that the bright ultraviolet part of the cloud may be due to scattered light from very fine particles (the same effect which makes smoke appear bluish).

  8. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System

    Science.gov (United States)

    Cohen, Fred; Rogers, Deanna T.; Neagoe, Vicentiu

    2008-10-14

    A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.

  9. Cyberethics and co-operation in the information society.

    Science.gov (United States)

    Fuchs, Christian; Bichler, Robert M; Raffl, Celina

    2009-12-01

    The task of this paper is to ground the notion of cyberethics of co-operation. The evolution of modern society has resulted in a shift from industrial society towards informational capitalism. This transformation is a multidimensional shift that affects all aspects of society. Hence also the ethical system of society is penetrated by the emergence of the knowledge society and ethical guidelines for the information age are needed. Ethical issues and conflicts in the knowledge society are connected to topics of ecological and social sustainability. For information ethics and cyberethics, the sustainable design of society, social, and socio-technological systems is important. In this context the notions of sustainability and co-operation are discussed. Based on these categories, the approach of cyberethics of co-operation can be theoretically grounded.

  10. Management of information for mission operations using automated keyword referencing

    Science.gov (United States)

    Davidson, Roger A.; Curran, Patrick S.

    1993-01-01

    Although millions of dollars have helped to improve the operability and technology of ground data systems for mission operations, almost all mission documentation remains bound in printed volumes. This form of documentation is difficult and timeconsuming to use, may be out-of-date, and is usually not cross-referenced with other related volumes of mission documentation. A more effective, automated method of mission information access is needed. A new method of information management for mission operations using automated keyword referencing is proposed. We expound on the justification for and the objectives of this concept. The results of a prototype tool for mission information access that uses a hypertextlike user interface and existing mission documentation are shared. Finally, the future directions and benefits of our proposed work are described.

  11. FIRE - Flyby of Io with Repeat Encounters: A conceptual design for a New Frontiers mission to Io

    Science.gov (United States)

    Suer, Terry-Ann; Padovan, Sebastiano; Whitten, Jennifer L.; Potter, Ross W. K.; Shkolyar, Svetlana; Cable, Morgan; Walker, Catherine; Szalay, Jamey; Parker, Charles; Cumbers, John; Gentry, Diana; Harrison, Tanya; Naidu, Shantanu; Trammell, Harold J.; Reimuller, Jason; Budney, Charles J.; Lowes, Leslie L.

    2017-09-01

    A conceptual design is presented for a low complexity, heritage-based flyby mission to Io, Jupiter's innermost Galilean satellite and the most volcanically active body in the Solar System. The design addresses the 2011 Decadal Survey's recommendation for a New Frontiers class mission to Io and is based upon the result of the June 2012 NASA-JPL Planetary Science Summer School. A science payload is proposed to investigate the link between the structure of Io's interior, its volcanic activity, its surface composition, and its tectonics. A study of Io's atmospheric processes and Io's role in the Jovian magnetosphere is also planned. The instrument suite includes a visible/near-IR imager, a magnetic field and plasma suite, a dust analyzer, and a gimbaled high gain antenna to perform radio science. Payload activity and spacecraft operations would be powered by three Advanced Stirling Radioisotope Generators (ASRG). The primary mission includes 10 flybys with close-encounter altitudes as low as 100 km. The mission risks are mitigated by ensuring that relevant components are radiation tolerant and by using redundancy and flight-proven parts in the design. The spacecraft would be launched on an Atlas V rocket with a delta-v of 1.3 km/s. Three gravity assists (Venus, Earth, Earth) would be used to reach the Jupiter system in a 6-year cruise. The resulting concept demonstrates the rich scientific return of a flyby mission to Io.

  12. IoT-based Asset Management System for Healthcare-related Industries

    OpenAIRE

    2015-01-01

    The healthcare industry has been focusing efforts on optimizing inventory management procedures through the incorporation of Information and Communication Technology, in the form of tracking devices and data mining, to establish ideal inventory models. In this paper, a roadmap is developed towards a technological assessment of the Internet of Things (IoT) in the healthcare industry, 2010–2020. According to the roadmap, an IoT-based healthcare asset management system (IoT-HAMS) is proposed and...

  13. Obtaining Io's internal state from in situ and remote observations

    Science.gov (United States)

    Khurana, Krishan; Keszthelyi, Laszlo; Jia, Xianzhe; McEwen, Alfred

    2016-04-01

    Based on sound theoretical arguments, Io has long been suspected of harboring a magma ocean in its interior. The extremely high temperature of the lava erupting on Io's surface indeed hint at an extremely hot interior consistent with an internal magma ocean. However, the only direct evidence for a melt layer in Io's interior has been provided by Khurana et al. (2011), who used Jupiter's rotating magnetic field as an electromagnetic induction signal. They have shown that a strong dipolar field is present in Galileo magnetometer data, which is consistent with electromagnetic induction from large amounts of rock-melts in Io's interior. Modeling of this signature showed that the induction response from a completely solid mantle model is inadequate to explain the magnetometer observations. However, they found that a layer of asthenosphere > 50 km in thickness with a rock melt fraction ≥ 20% is adequate to accurately model the observed magnetic field. In this presentation, we first provide a progress report on our effort to marry the principles of thermodynamics with those of electromagnetism to further constrain the temperature profile inside Io. The constraints on the mineralogy, temperature and melt state of Io are being obtained from MELTS a modeling program that utilizes thermodynamic principles to calculate the chemical variations in the assemblages of minerals and melts as a function of pressure, temperature and oxygen fugacity. Electromagnetic induction response is calculated by solving the induction equation numerically for several different models of the interior and tested for their agreement with the Galileo magnetometer data. Next, we explore how future in situ and remote observations could be used to characterize Io's interior using multi-frequency electromagnetic induction and auroral observations. We show that the lithospheric thickness can be obtained from induction response at the Jovian synodic period while information on the magma ocean thickness

  14. Cybersecurity Activities Support to DoD Information Network Operations

    Science.gov (United States)

    2016-03-07

    Overall ISCM furnishes ongoing observation, assessment, analysis, and diagnosis of an organization’s cybersecurity posture , cyber hygiene , and...audit and assessment processes in coordination with CDRUSSTRATCOM. m. Reviews the cybersecurity posture of systems authorized to operate outside...d. Supports the RMF by providing ongoing awareness and security status of the posture of an organization’s information and systems. This

  15. Environmental Quality Information Analysis Center (EQIAC) operating procedures handbook

    Energy Technology Data Exchange (ETDEWEB)

    Walsh, T.E. (Florida Univ., Gainesville, FL (United States)); Das, S. (Oak Ridge National Lab., TN (United States))

    1992-08-01

    The Operating Procedures Handbook of the Environmental Quality Information Analysis Center (EQIAC) is intended to be kept current as EQIAC develops and evolves. Its purpose is to provide a comprehensive guide to the mission, infrastructure, functions, and operational procedures of EQIAC. The handbook is a training tool for new personnel and a reference manual for existing personnel. The handbook will be distributed throughout EQIAC and maintained in binders containing current dated editions of the individual sections. The handbook will be revised at least annually to reflect the current structure and operational procedures of EQIAC. The EQIAC provides information on environmental issues such as compliance, restoration, and environmental monitoring do the Air Force and DOD contractors.

  16. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

    OpenAIRE

    Angrishi, Kishore

    2017-01-01

    Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if cons...

  17. Analysis of information systems for hydropower operations: Executive summary

    Science.gov (United States)

    Sohn, R. L.; Becker, L.; Estes, J.; Simonett, D.; Yeh, W.

    1976-01-01

    An analysis was performed of the operations of hydropower systems, with emphasis on water resource management, to determine how aerospace derived information system technologies can effectively increase energy output. Better utilization of water resources was sought through improved reservoir inflow forecasting based on use of hydrometeorologic information systems with new or improved sensors, satellite data relay systems, and use of advanced scheduling techniques for water release. Specific mechanisms for increased energy output were determined, principally the use of more timely and accurate short term (0-7 days) inflow information to reduce spillage caused by unanticipated dynamic high inflow events. The hydrometeorologic models used in predicting inflows were examined in detail to determine the sensitivity of inflow prediction accuracy to the many variables employed in the models, and the results were used to establish information system requirements. Sensor and data handling system capabilities were reviewed and compared to the requirements, and an improved information system concept was outlined.

  18. Implementation of operational meteorological information service for CARE REMDAS

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Sung Nam; Nam, Jae Cheol; Choi, Jae Chun [Meteorological Reaearch Institute, Seoul (Korea, Republic of); Lee, Byong Lyol; Lee, Bo Ram; Shin, Hyun Cheol; Park, Nan Ah [Korea Meteorological Administration, Seoul (Korea, Republic of); Song, Chang Keun; Park, Sang Jong [Seoul National Univ., Seoul (Korea, Republic of)

    1999-12-15

    The scope of this study consists of : improve of CARE REMDAS - identification of meteorolgical information required for nuclear emergency response and their efficient use on a real-time basis, review of the production and operation of KMA NWP nodels and their applications. Suggestions on the improvements in nuclear emergency response systme from the care studies of both domestic and foreign countries - case study of a domestic model for radioactivity T/D in terms of model dynamics and operation, investigation of promising support systems by reviewing the current status of T/D model in UK. Recommendations on a promising meteorological information sevices based on foreign cases - examinations of DWD system, including EU for nuclear emergency response, review on the meteorogical information support by DWD for NERS.

  19. Exploring network operations for data and information networks

    Science.gov (United States)

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  20. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android

    OpenAIRE

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan; Sunyaev, Ali

    2015-01-01

    Background Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. Objective The objective of this st...

  1. Cyberspace Operations in Support of Counterinsurgency Operations

    Science.gov (United States)

    2013-04-10

    probability it is being used for strategic communication, information operations (io), advertisement for recruits, so- licitation of funding and ongoing...reliability. implementation plans and advertising exist for 3G- and General Packet Radio Service-based networks, which will mark a significant jump in...substantial role in contributing to the coordination efforts of protestors. Websites such as facebook and twitter, various blogs and the use of text messages

  2. IoT-based Asset Management System for Healthcare-related Industries

    Directory of Open Access Journals (Sweden)

    Lee Carman Ka Man

    2015-11-01

    Full Text Available The healthcare industry has been focusing efforts on optimizing inventory management procedures through the incorporation of Information and Communication Technology, in the form of tracking devices and data mining, to establish ideal inventory models. In this paper, a roadmap is developed towards a technological assessment of the Internet of Things (IoT in the healthcare industry, 2010–2020. According to the roadmap, an IoT-based healthcare asset management system (IoT-HAMS is proposed and developed based on Artificial Neural Network (ANN and Fuzzy Logic (FL, incorporating IoT technologies for asset management to optimize the supply of resources.

  3. iOS 6 foundations

    CERN Document Server

    Feiler, Jesse

    2013-01-01

    A practical introduction for using iOS 6 to create universal apps If you have prior experience programming in an object-oriented language and are eager to start building universal apps for iPad and iPhone (including the iPod touch), then this is the book for you! Using the latest version of iOS (iOS 6) along with the latest version of Xcode (Xcode 4.5), this book is a practical introduction rather than just a catalog of components. Full-color and packed with groundbreaking, innovative designs, this book teaches you how to create eye-catching, unique apps. Teaches you the va

  4. 75 FR 71464 - Metlife Technology, Operations, and Information Technology Groups Including On-Site Leased...

    Science.gov (United States)

    2010-11-23

    ... Employment and Training Administration Metlife Technology, Operations, and Information Technology Groups... Moosic, PA, Metlife Technology, Operations, and Information Technology Groups Including On-Site Leased... of MetLife, Technology, Operations, and Information Technology Groups, Moosic, Pennsylvania...

  5. iOS 5 Essentials

    CERN Document Server

    Daniel, Steven F

    2012-01-01

    Each chapter will take you through a new major feature of iOS 5. You will learn how to integrate each feature into your applications. If you ever wanted to learn about the latest features of iOS 5 and learn how to incorporate Twitter, iCloud and Core Image framework effects functionality into your applications, then this book is for you. You should have a good knowledge of programming experience with Objective-C, and have used Xcode 4. iPhone programming experience is not required.

  6. Activity-Based Information Integrating the operations strategy

    Directory of Open Access Journals (Sweden)

    José Augusto da Rocha de Araujo

    2005-12-01

    Full Text Available In the globalized world, companies seek for new operations strategies to ensure world corporate success. This article analyzes how the cost management models – both traditional and activity-based, aid the planning and management of corporate globalized operations. The efficacy of the models application depends on their alignment with the competitive strategy. Companies must evaluate the nature of the competition and its competitive priorities; they should then define the necessary and sufficient dependence level on costs information. In this article, three dependence levels are presented: operational, decision support and strategic control. The result of the research shows the importance of alignment between the cost management model and the competitive strategy for corporate success, and confirms the adequacy of the activity-based costing model as a supporting tool for decision taking in a global strategy. Case studies in world class companies in Brazil are presented.

  7. Understanding Commanders’ Information Needs for Influence Operations

    Science.gov (United States)

    2009-01-01

    Michaelis, “Winning the Peace: The Requirement for Full-Spectrum Operations,” Military Review, July–August 2005, pp. 4–17. Cialdini , Robert B., and Noah J...in James P. Kahan, D. Robert Worley, and Cath- leen Stasz, Understanding Commanders’ Information Needs, R-3761-1, Santa Monica, Calif.: RAND...Santa Monica, Calif.: RAND Corporation, 2006; and Walter L. Perry, Robert W. Button, Jerome Bracken, Thomas Sullivan, and Jonathan Mitchell, Mea- sures

  8. A Reference Model for Monitoring IoT WSN-Based Applications

    Directory of Open Access Journals (Sweden)

    Juan Vicente Capella

    2016-10-01

    Full Text Available The Internet of Things (IoT is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP, which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN’s behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  9. A Reference Model for Monitoring IoT WSN-Based Applications.

    Science.gov (United States)

    Capella, Juan Vicente; Campelo, José Carlos; Bonastre, Alberto; Ors, Rafael

    2016-10-30

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP), which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN's behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  10. Students versus IoT Security

    CERN Document Server

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  11. Solar control of sodium escape from Io

    National Research Council Canada - National Science Library

    Grava, Cesare; Schneider, Nicholas M; Leblanc, François; Morgenthaler, Jeffrey P; Mangano, Valeria; Barbieri, Cesare

    2014-01-01

    We report ground‐based spectroscopic observations of the Io sodium cloud before and after eclipse by Jupiter, in a search for possible effects of sunlight on the total atomic sodium content in Io's exosphere...

  12. Galileo's Last Fly-Bys of Io: NIMS Observations of Loki, Tupan, and Emakong Calderas

    Science.gov (United States)

    Lopes, Rosaly M. C.; Kamp, L. W.; Davies, A. G.; Smythe, W. D.; Carlson, R. W.; Doute, S.; McEwen, A.; Turtle, E. P.; Leader, F.; Mehlman, R.

    2002-01-01

    NIMS results from the 2001 Galileo fly-bys of Io will be presented, focusing on three calderas that may contain lava lakes. Preliminary results from the January 2002 Io fly-by will be presented. Additional information is contained in the original extended abstract.

  13. Galileo SSI Observations of Io During Orbits C30 I33

    Science.gov (United States)

    Keszthelyi, L.; Turtle, E.; McEwen, A.; Simonelli, D.; Geissler, P.; Williams, D.; Milazzo, M.; Radebaugh, J.; Jaeger, W.; Klaasen, K. P.

    2002-01-01

    New Galileo SSI imaging of Io from orbits C30 I33 will be presented. The aging Galileo spacecraft continues to produce spectacular new results, including the tallest volcanic plume yet found on Io. Additional information is contained in the original extended abstract.

  14. Landform Degradation and Slope Processes on Io: The Galileo View

    Science.gov (United States)

    Moore, Jeffrey M.; Sullivan, Robert J.; Chuang, Frank C.; Head, James W., III; McEwen, Alfred S.; Milazzo, Moses P.; Nixon, Brian E.; Pappalardo, Robert T.; Schenk, Paul M.; Turtle, Elizabeth P.; DeVincenzi, Donald (Technical Monitor)

    2001-01-01

    The Galileo mission has revealed remarkable evidence of mass movement and landform degradation on Io. We recognize four major slope types observed on a number of intermediate resolution (250 m/pixel) images and several additional textures on very high resolution (10 m/pixel) images. Slopes and scarps on Io often show evidence of erosion, seen in the simplest form as alcove-carving slumps and slides at all scales. Many of the mass movement deposits on Io are probably mostly the consequence of block release and brittle slope failure. Sputtering plays no significant role. Sapping as envisioned by McCauley et al. remains viable. We speculate that alcove-lined canyons seen in one observation and lobed deposits seen along the bases of scarps in several locations may reflect the plastic deformation and 'glacial' flow of interstitial volatiles (e.g., SO2) heated by locally high geothermal energy to mobilize the volatile. The appearance of some slopes and near-slope surface textures seen in very high resolution images is consistent with erosion from sublimation-degradation. However, a suitable volatile (e.g., H2S) that can sublimate fast enough to alter Io's youthful surface has not been identified. Disaggregation from chemical decomposition of solid S2O and other polysulfur oxides may conceivably operate on Io. This mechanism could degrade landforms in a manner that resembles degradation from sublimation, and at a rate that can compete with resurfacing.

  15. Learning iOS forensics

    CERN Document Server

    Epifani, Mattia

    2015-01-01

    If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

  16. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities.

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-06-29

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  17. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-06-01

    Full Text Available The Internet-of-Things (IoT is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  18. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-01-01

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds. PMID:27367695

  19. Generating route choice sets with operation information on metro networks

    Directory of Open Access Journals (Sweden)

    Wei Zhu

    2016-06-01

    Full Text Available In recent years, the metro system has advanced into an efficient transport system and become the mainstay of urban passenger transport in many mega-cities. Passenger flow is the foundation of making and coordinating operation plans for the metro system, and therefore, a variety of studies were conducted on transit assignment models. Nevertheless route choice sets of passengers also play a paramount role in flow estimation and demand prediction. This paper first discusses the main route constraints of which the train schedule is the most important, that distinguish rail networks from road networks. Then, a two-step approach to generate route choice set in a metro network is proposed. Particularly, the improved approach introduces a route filtering with train operational information based on the conventional method. An initial numerical test shows that the proposed approach gives more reasonable route choice sets for scheduled metro networks, and, consequently, obtains more accurate results from passenger flow assignment. Recommendations for possible opportunities to apply this approach to metro operations are also provided, including its integration into a metro passenger flow assignment and simulation system in practice to help metro authorities provide more precise guidance information for passengers to travel.

  20. The Internet of Things (IoT: An Overview

    Directory of Open Access Journals (Sweden)

    Antar Shaddad Abdul-Qawy

    2015-12-01

    Full Text Available Information and Communications Technology (ICT controls our daily behaviors. It becomes a main part of our life critical infrastructure bringing interconnection of heterogeneous devices in different aspects. Personal computing, sensing, surveillance, smart homes, entertainment, transportation and video streaming are examples, to name a few. As a critical living entity, Internet is contentiously changing and evolving leading to emerging new technologies, applications, protocols and algorithms. Acceleration of wireless communication trends brings an ever growing innovation in Internet connectivity and mobile broadband. Infrastructureless communication devices become ubiquitous, smart, powerful, connectible, smaller, cheaper, and easier to deploy and install. This opens a new future direction in the society of ICT: the Internet of Things (IoT. Nowadays, the IoT, early defined as Machine-to-Machine (M2M communications, becomes a key concern of ICT world and research communities. In this paper, we provide an overview study of the IoT paradigm, its concepts, principles and potential benefits. Specifically, we focus on the IoT major technologies, emerging protocols, and widespread applications. This overview can help those who start approaching the IoT world aiming to understand and participate to its development.

  1. Information Flow Model of Human Extravehicular Activity Operations

    Science.gov (United States)

    Miller, Matthew J.; McGuire, Kerry M.; Feigh, Karen M.

    2014-01-01

    Future human spaceflight missions will face the complex challenge of performing human extravehicular activity (EVA) beyond the low Earth orbit (LEO) environment. Astronauts will become increasingly isolated from Earth-based mission support and thus will rely heavily on their own decision-making capabilities and onboard tools to accomplish proposed EVA mission objectives. To better address time delay communication issues, EVA characters, e.g. flight controllers, astronauts, etc., and their respective work practices and roles need to be better characterized and understood. This paper presents the results of a study examining the EVA work domain and the personnel that operate within it. The goal is to characterize current and historical roles of ground support, intravehicular (IV) crew and EV crew, their communication patterns and information needs. This work provides a description of EVA operations and identifies issues to be used as a basis for future investigation.

  2. E-RESOURCES GEOGRAPHIC INFORMATION SYSTEM SYSTEM FOR MILITARY OPERATION

    Directory of Open Access Journals (Sweden)

    Aditya Kurniawan

    2013-01-01

    Full Text Available Nowadays, the barometer of the strength of a country is a military force that is owned by the state. To produce a good military force in a country, it would require an easy, fast and accurate military resource management. This study utilized geographic data as a reference for the location of the logistics resources to help simplify the management of military data using spatial data in Geographic Information System (GIS. The system development approach used JSON Service technology framework and HTML 5 to improve system performance. The features development of the management of military resources associated with military operations are conducted. Results of this study generate e-resource military operation system which is swift and in accordance with the W3C web standards.

  3. 75 FR 16160 - Notice of Proposed Information Collection for Public Comment; Allocation of Operating Subsidies...

    Science.gov (United States)

    2010-03-31

    ... URBAN DEVELOPMENT Notice of Proposed Information Collection for Public Comment; Allocation of Operating Subsidies Under the Operating Fund Formula: Data Collection AGENCY: Office of the Assistant Secretary for... lists the following information: Title of Proposal: Allocation of Operating Subsidies Under...

  4. Ergonomic design in the operating room: information technologies

    Science.gov (United States)

    Morita, Mark M.; Ratib, Osman

    2005-04-01

    The ergonomic design in the Surgical OR of information technology systems has been and continues to be a large problem. Numerous disparate information systems with unique hardware and display configurations create an environment similar to the chaotic environments of air traffic control. Patient information systems tend to show all available statistics making it difficult to isolate the key, relevant vitals for the patient. Interactions in this sterile environment are still being done with the traditional keyboard and mouse designed for cubicle office workflows. This presentation will address the shortcomings of the current design paradigm in the Surgical OR that relate to Information Technology systems. It will offer a perspective that addresses the ergonomic deficiencies and predicts how future technological innovations will integrate into this vision. Part of this vision includes a Surgical OR PACS prototype, developed by GE Healthcare Technologies, that addresses ergonomic challenges of PACS in the OR that include lack of portability, sterile field integrity, and UI targeted for diagnostic radiologists. GWindows (gesture control) developed by Microsoft Research and Voice command will allow for the surgeons to navigate and review diagnostic imagery without using the conventional keyboard and mouse that disrupt the integrity of the sterile field. This prototype also demonstrates how a wireless, battery powered, self contained mobile PACS workstation can be optimally positioned for a surgeon to reference images during an intervention as opposed to the current pre-operative review. Lessons learned from the creation of the Surgical OR PACS Prototype have demonstrated that PACS alone is not the end all solution in the OR. Integration of other disparate information systems and presentation of this information in simple, easy to navigate information packets will enable smoother interactions for the surgeons and other healthcare professionals in the OR. More intuitive

  5. 75 FR 70279 - Notice of Submission of Proposed Information Collection to OMB; Allocation of Operating Subsidies...

    Science.gov (United States)

    2010-11-17

    ...: Allocation of Operating Subsidies under the Operating Fund. Formula: Data Collection. OMB Approval Number... URBAN DEVELOPMENT Notice of Submission of Proposed Information Collection to OMB; Allocation of Operating Subsidies under the Operating Fund Formula: Data Collection AGENCY: Office of the...

  6. Io in Front of Jupiter

    Science.gov (United States)

    2000-01-01

    Jupiter's four largest satellites, including Io, the golden ornament in front of Jupiter in this image from NASA's Cassini spacecraft, have fascinated Earthlings ever since Galileo Galilei discovered them in 1610 in one of his first astronomical uses of the telescope.Images from Cassini that will be released over the next several days capture each of the four Galilean satellites in their orbits around the giant planet.This true-color composite frame, made from narrow angle images taken on Dec. 12, 2000, captures Io and its shadow in transit against the disk of Jupiter. The distance of the spacecraft from Jupiter was 19.5 million kilometers (12.1 million miles). The image scale is 117 kilometers (73 miles) per pixel.The entire body of Io, about the size of Earth's Moon, is periodically flexed as it speeds around Jupiter and feels, as a result of its non-circular orbit, the periodically changing gravitational pull of the planet. The heat arising in Io's interior from this continual flexure makes it the most volcanically active body in the solar system, with more than 100 active volcanoes. The white and reddish colors on its surface are due to the presence of different sulfurous materials. The black areas are silicate rocks.Cassini is a cooperative project of NASA, the European Space Agency and the Italian Space Agency. The Jet Propulsion Laboratory, a division of the California Institute of Technology in Pasadena, manages the Cassini mission for NASA's Office of Space Science, Washington, D.C.

  7. Programming iOS 6

    CERN Document Server

    Neuburg, Matt

    2013-01-01

    Get a solid grounding in all the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition, you'll dig into Cocoa and learn how to work effectively with Objective-C and Xcode. This book covers iOS 6 in a rigorous, orderly fashion-ideal whether you're approaching iOS for the first time or need a reference to bolster existing skills. Learn about features introduced with iOS 6, including Objective-C language advances, autosynthesis, autolayout, new view controller rotation rules, unwind segues, state restoration, styled text, and collection views. * Learn Objective-C language details and object-oriented programming concepts * Understand the anatomy of an Xcode project and all the stages of its lifecycle * Grasp key Cocoa concepts such as relationships between classes, receiving events, and model-view-controller architecture * Learn how views and layers are managed, drawn, composited, and animated * Become familiar with view controllers and thei...

  8. Hanford Environmental Information System (HEIS) Operator`s Manual. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Schreck, R.I.

    1991-10-01

    The Hanford Environmental Information System (HEIS) is a consolidated set of automated resources that effectively manage the data gathered during environmental monitoring and restoration of the Hanford Site. The HEIS includes an integrated database that provides consistent and current data to all users and promotes sharing of data by the entire user community. This manual describes the facilities available to the operational user who is responsible for data entry, processing, scheduling, reporting, and quality assurance. A companion manual, the HEIS User`s Manual, describes the facilities available-to the scientist, engineer, or manager who uses the system for environmental monitoring, assessment, and restoration planning; and to the regulator who is responsible for reviewing Hanford Site operations against regulatory requirements and guidelines.

  9. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities...... and information flow. In this paper, we seek to illustrate and classify insider threats in relation to the IoT (by ‘smart insiders’), exhibiting attack vectors for their characterisation. To model the attacks we apply a method of formal modelling of Insider Threats in the interactive theorem prover Isabelle....... On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack trees....

  10. Interpreting Low Spatial Resolution Thermal Data from Active Volcanoes on Io and the Earth

    Science.gov (United States)

    Keszthelyi, L.; Harris, A. J. L.; Flynn, L.; Davies, A. G.; McEwen, A.

    2001-01-01

    The style of volcanism was successfully determined at a number of active volcanoes on Io and the Earth using the same techniques to interpret thermal remote sensing data. Additional information is contained in the original extended abstract.

  11. IoT-based user-driven service modeling environment for a smart space management system

    National Research Council Canada - National Science Library

    Choi, Hoan-Suk; Rhee, Woo-Seop

    2014-01-01

    .... The IoT connects various physical entities. These entities have communication capability and deploy the observed information to various service areas such as building management, energy-saving systems, surveillance services, and smart homes...

  12. Research and design of smart grid monitoring control via terminal based on iOS system

    Science.gov (United States)

    Fu, Wei; Gong, Li; Chen, Heli; Pan, Guangji

    2017-06-01

    Aiming at a series of problems existing in current smart grid monitoring Control Terminal, such as high costs, poor portability, simple monitoring system, poor software extensions, low system reliability when transmitting information, single man-machine interface, poor security, etc., smart grid remote monitoring system based on the iOS system has been designed. The system interacts with smart grid server so that it can acquire grid data through WiFi/3G/4G networks, and monitor each grid line running status, as well as power plant equipment operating conditions. When it occurs an exception in the power plant, incident information can be sent to the user iOS terminal equipment timely, which will provide troubleshooting information to help the grid staff to make the right decisions in a timely manner, to avoid further accidents. Field tests have shown the system realizes the integrated grid monitoring functions, low maintenance cost, friendly interface, high security and reliability, and it possesses certain applicable value.

  13. uFlip: Understanding Flash IO Patterns

    DEFF Research Database (Denmark)

    Bouganim, Luc; Jonsson, Bjørn; Bonnet, Philippe

    2009-01-01

    want to establish what kind of IOs should be favored (or avoided) when designing algorithms and architectures for flash-based systems. In this paper, we focus on flash IO patterns, that capture relevant distribution of IOs in time and space, and our goal is to quantify their performance. We define u......FLIP, a benchmark for measuring the response time of flash IO patterns. We also present a benchmarking methodology which takes into account the particular characteristics of flash devices. Finally, we present the results obtained by measuring eleven flash devices, and derive a set of design hints that should drive...

  14. Wind Information Uplink to Aircraft Performing Interval Management Operations

    Science.gov (United States)

    Ahmad, Nashat N.; Barmore, Bryan E.; Swieringa, Kurt A.

    2016-01-01

    Interval Management (IM) is an ADS-B-enabled suite of applications that use ground and flight deck capabilities and procedures designed to support the relative spacing of aircraft (Barmore et al., 2004, Murdoch et al. 2009, Barmore 2009, Swieringa et al. 2011; Weitz et al. 2012). Relative spacing refers to managing the position of one aircraft to a time or distance relative to another aircraft, as opposed to a static reference point such as a point over the ground or clock time. This results in improved inter-aircraft spacing precision and is expected to allow aircraft to be spaced closer to the applicable separation standard than current operations. Consequently, if the reduced spacing is used in scheduling, IM can reduce the time interval between the first and last aircraft in an overall arrival flow, resulting in increased throughput. Because IM relies on speed changes to achieve precise spacing, it can reduce costly, low-altitude, vectoring, which increases both efficiency and throughput in capacity-constrained airspace without negatively impacting controller workload and task complexity. This is expected to increase overall system efficiency. The Flight Deck Interval Management (FIM) equipment provides speeds to the flight crew that will deliver them to the achieve-by point at the controller-specified time, i.e., assigned spacing goal, after the target aircraft crosses the achieve-by point (Figure 1.1). Since the IM and target aircraft may not be on the same arrival procedure, the FIM equipment predicts the estimated times of arrival (ETA) for both the IM and target aircraft to the achieve-by point. This involves generating an approximate four-dimensional trajectory for each aircraft. The accuracy of the wind data used to generate those trajectories is critical to the success of the IM operation. There are two main forms of uncertainty in the wind information used by the FIM equipment. The first is the accuracy of the forecast modeling done by the weather

  15. iOS Game Development using SpriteKit Framework with Swift Programming Language

    OpenAIRE

    Gurung, Lal

    2016-01-01

    iOS is a mobile operating system for Apple manufactured phones and tablets. Mobile Gaming Industries are growing very fast, and compatibility with iOS is becoming very popular among game developers. The aim of this Bachelor’s thesis was to find the best available game development tools for iOS platform. The 2D game named Lapland was developed using Apple’s own native framework, SpriteKit. The game was written with the SpriteKit programming language. The combination of SpriteKit and Swift...

  16. 76 FR 50152 - Airworthiness Directives; Lycoming Engines (L)O-360, (L)IO-360, AEIO-360, O-540, IO-540, AEIO-540...

    Science.gov (United States)

    2011-08-12

    ...)O-360, (L)IO-360, AEIO-360, O-540, IO-540, AEIO-540, (L)TIO-540, IO-580, and IO-720 Series...-14778 (71 FR 57407, September 29, 2006), for Lycoming Engines (L)O-360, (L)IO-360, AEIO-360, O-540, IO... Lycoming Engines (L)O-360, (L)IO- 360, AEIO-360, O-540, IO-540, AEIO-540, (L)TIO-540, IO-580, and IO-...

  17. 30 CFR 778.11 - Providing applicant and operator information.

    Science.gov (United States)

    2010-07-01

    ... SYSTEMS UNDER REGULATORY PROGRAMS PERMIT APPLICATIONS-MINIMUM REQUIREMENTS FOR LEGAL, FINANCIAL... are corporations, partnerships, associations, sole proprietorships, or other business entities; (2... operator, if different from the applicant. (4) Each business entity in the applicant's and operator's...

  18. The Integration of DCS I/O to an Existing PLC

    Science.gov (United States)

    Sadhukhan, Debashis; Mihevic, John

    2013-01-01

    At the NASA Glenn Research Center (GRC), Existing Programmable Logic Controller (PLC) I/O was replaced with Distributed Control System (DCS) I/O, while keeping the existing PLC sequence Logic. The reason for integration of the PLC logic and DCS I/O, along with the evaluation of the resulting system is the subject of this paper. The pros and cons of the old system and new upgrade are described, including operator workstation screen update times. Detail of the physical layout and the communication between the PLC, the DCS I/O and the operator workstations are illustrated. The complex characteristics of a central process control system and the plan to remove the PLC processors in future upgrades is also discussed.

  19. 46 CFR 170.135 - Operating information for a vessel with Type III subdivision.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Operating information for a vessel with Type III... Operating Personnel § 170.135 Operating information for a vessel with Type III subdivision. (a) In addition to the information required in 46 CFR 170.110, the stability booklet of a passenger vessel with...

  20. 23 CFR 752.8 - Privately operated information centers and systems.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Privately operated information centers and systems. 752... may permit privately operated information centers and systems which conform with the standards of this... AND ENVIRONMENT LANDSCAPE AND ROADSIDE DEVELOPMENT § 752.8 Privately operated information centers...

  1. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  2. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  3. Sesame IO Library User Manual Version 8

    Energy Technology Data Exchange (ETDEWEB)

    Abhold, Hilary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Young, Ginger Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-15

    This document is a user manual for SES_IO, a low-level library for reading and writing sesame files. The purpose of the SES_IO library is to provide a simple user interface for accessing and creating sesame files that does not change across sesame format type (such as binary, ascii, and xml).

  4. International Organizations (IOs), Epistemic Tools of Influence, and the Colonial Geopolitics of Knowledge Production in Higher Education Policy

    Science.gov (United States)

    Shahjahan, Riyad A.

    2016-01-01

    While other scholars have analyzed the way that international organizations (IOs) in higher education policy may contribute to neocolonial domination, this paper illuminates not only on "how" IOs' epistemic activities promulgate one-size fit all solutions, but centers the colonial structures of knowledge/power that inform the…

  5. Application of IoT in monitoring and controlling agricultural production

    Directory of Open Access Journals (Sweden)

    Marković Dušan

    2015-01-01

    Full Text Available Internet of Things (IoT is a concept that allows physical objects with computational and sensory support to connect with each other and access services across the Internet. The IoT idea was introduced to connect devices through the Internet and facilitate access to information for users. The wide range of potential applications of IoT also includes agriculture, where extensive use of IoT is expected in the future. The aim of this work was to present the IoT concept as a basis for monitoring and control systems used in farm production processes. IoT devices play a key role, with a focus on their realization by available microcontroller platforms and appropriate sensors such as Arduino products. Autonomous sensor devices gather data within monitoring systems and participate in the control process by sending signals to the actuators. Such an IoT based system provides users with the opportunity to remotely monitor conditions and production process. This system enables users to accomplish savings in inputs, achieve cost reduction and trace the production process on the farm.

  6. 47 CFR 76.1610 - Change of operational information.

    Science.gov (United States)

    2010-10-01

    ... assumed name (if any) used for doing business in each community; (c) The physical address, including zip... Mail Address, and Year and Month service was first provided by the physical system. ... operator; change of legal name, change of the operator's mailing address or FCC Registration Number...

  7. H-infty Control of systems with multiple i/o delays

    NARCIS (Netherlands)

    Agoes Ariffin Moelja, A.A.; Meinsma, Gjerrit; Mirkin, Leonid

    2003-01-01

    In this paper the standard (four-block) H-infty control problem for systems with multiple i/o delays in the feedback loop is studied. The central idea is to see the multiple delay operator as a special series connection of elementary delay operators, called the adobe delay operators. The adobe delay

  8. $H^\\infty$ control of systems with multiple i/o delays

    NARCIS (Netherlands)

    Meinsma, Gjerrit; Mirkin, Leonid

    2003-01-01

    In this paper the standard (four-block) $H^\\infty$ control problem for systems with multiple i/o delays in the feedback loop is studied. The central idea is to see the multiple delay operator as a special series connection of elementary delay operators, called the adobe delay operators. The adobe de

  9. Technical information report: Plasma melter operation, reliability, and maintenance analysis

    Energy Technology Data Exchange (ETDEWEB)

    Hendrickson, D.W. [ed.

    1995-03-14

    This document provides a technical report of operability, reliability, and maintenance of a plasma melter for low-level waste vitrification, in support of the Hanford Tank Waste Remediation System (TWRS) Low-Level Waste (LLW) Vitrification Program. A process description is provided that minimizes maintenance and downtime and includes material and energy balances, equipment sizes and arrangement, startup/operation/maintence/shutdown cycle descriptions, and basis for scale-up to a 200 metric ton/day production facility. Operational requirements are provided including utilities, feeds, labor, and maintenance. Equipment reliability estimates and maintenance requirements are provided which includes a list of failure modes, responses, and consequences.

  10. Universal I/O Design for Customizing MCU

    Institute of Scientific and Technical Information of China (English)

    Jongsung; Kim; Jungwhan; Choi; Seongsoo; Lee

    2010-01-01

    <正>Typically,a variety of digital devices are built into the MCU.These digital devices in order to develop a variety of applications PC,various devices such as smart phones should be easily connected.But so far the interface of these devices has not been a unified approach. Development of various types of devices to easily shall be equipped with various interfaces such as UART,SPI,I2C. However,there follows a lot of hardware problems to greatly increasing the number of I/O ports.Universal I/O are four types based on the same port.Each port is controlled the software approach to operate UART,SPI, I2C,etc.

  11. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  12. Escape mechanisms of dust in Io

    Science.gov (United States)

    Flandes, A.

    The injection of material into the jovian magnetosphere through Io's volcanic activity makes possible the formation of structures such as the plasma torus and the dust ballerina skirt. Io's high temperature volcanism produces spectacular plumes, but even the tallest plumes, as those of Pelen Patera, will not produce enough energy to defeat the gravitational attraction of Io. The fact is that dust escapes from Io, which implies that a second mechanism is acting on the grains. Grains brought to the top of the highest plumes by the volcanic forces are still under Io's gravitational pull, but need only a minimum charge (~10-1 4 C) so that the Lorentz force due to the Jovian magnetic field equilibrates this attraction. In the volcanic vents, the escape velocity of the ejected material and its own density produces enough collisions to create charges. On top of the highest plumes (~500km) charged grains are exposed to the plasma torus that co-rotates rigidly with Jupiter and, due to the relative velocity among Io and the torus, the grains will be dragged away from Io. As it is well known, these dust grains will also be dragged away from Jupiter.

  13. I/O Performance of AIPS++

    Science.gov (United States)

    Roberts, D. A.; Crutcher, R. M.; Imeraj, E.; Kemball, A.; Young, W.

    We report on a collaborative project to investigate the input/output (I/O) performance of the AIPS++ system with particular emphasis on the the I/O characteristics of our parallel, MPI-based application pimager. The AIPS++ parallel group has been working extensively with the Pablo group of the University of Illinois Computer Science department. The Pablo group has developed an I/O and event tracing library that records the counts and timing of I/O calls in an application program, as well as tools to analyze the output trace records. A graduate student from the Pablo project, working closely with the AIPS++ parallel group, has included the I/O instrumentation calls into the AIPS++ code to allow I/O and event tracing during the execution of any AIPS++ application. The AIPS++ parallel and Pablo groups have carried out several joint experiments using the parallel version of the imager application ( pimager). Pimager does parallel deconvolution of a spectral-line data set using the Clark CLEAN algorithm; parallelism is implemented with the Message Passing Interface (MPI). The experiments were run on a 128-processor SGI Origin 2000 at NCSA. The I/O characteristics of the pimager program from these experiments are presented.

  14. 77 FR 41371 - Proposed Information Collection; Comment Request; Foreign Airline Operators' Revenues and...

    Science.gov (United States)

    2012-07-13

    ... Bureau of Economic Analysis Proposed Information Collection; Comment Request; Foreign Airline Operators... INFORMATION: I. Abstract Form BE-9, Foreign Airline Operators' Revenues and Expenses in the United States, obtains quarterly data from U.S. offices, agents, or other representatives of foreign airline operators...

  15. 47 CFR 64.707 - Public dissemination of information by providers of operator services.

    Science.gov (United States)

    2010-10-01

    ... § 64.707 Public dissemination of information by providers of operator services. Providers of operator... 47 Telecommunication 3 2010-10-01 2010-10-01 false Public dissemination of information by providers of operator services. 64.707 Section 64.707 Telecommunication FEDERAL COMMUNICATIONS...

  16. IoT-based user-driven service modeling environment for a smart space management system.

    Science.gov (United States)

    Choi, Hoan-Suk; Rhee, Woo-Seop

    2014-11-20

    The existing Internet environment has been extended to the Internet of Things (IoT) as an emerging new paradigm. The IoT connects various physical entities. These entities have communication capability and deploy the observed information to various service areas such as building management, energy-saving systems, surveillance services, and smart homes. These services are designed and developed by professional service providers. Moreover, users' needs have become more complicated and personalized with the spread of user-participation services such as social media and blogging. Therefore, some active users want to create their own services to satisfy their needs, but the existing IoT service-creation environment is difficult for the non-technical user because it requires a programming capability to create a service. To solve this problem, we propose the IoT-based user-driven service modeling environment to provide an easy way to create IoT services. Also, the proposed environment deploys the defined service to another user. Through the personalization and customization of the defined service, the value and dissemination of the service is increased. This environment also provides the ontology-based context-information processing that produces and describes the context information for the IoT-based user-driven service.

  17. Enabling Large-Scale IoT-Based Services through Elastic Publish/Subscribe.

    Science.gov (United States)

    Vavassori, Sergio; Soriano, Javier; Fernández, Rafael

    2017-09-19

    In this paper, we report an algorithm that is designed to leverage the cloud as infrastructure to support Internet of Things (IoT) by elastically scaling in/out so that IoT-based service users never stop receiving sensors' data. This algorithm is able to provide an uninterrupted service to end users even during the scaling operation since its internal state repartitioning is transparent for publishers or subscribers; its scaling operation is time-bounded and depends only on the dimension of the state partitions to be transmitted to the different nodes. We describe its implementation in E-SilboPS, an elastic content-based publish/subscribe (CBPS) system specifically designed to support context-aware sensing and communication in IoT-based services. E-SilboPS is a key internal asset of the FIWARE IoT services enablement platform, which offers an architecture of components specifically designed to capture data from, or act upon, IoT devices as easily as reading/changing the value of attributes linked to context entities. In addition, we discuss the quantitative measurements used to evaluate the scale-out process, as well as the results of this evaluation. This new feature rounds out the context-aware content-based features of E-SilboPS by providing, for example, the necessary middleware for constructing dashboards and monitoring panels that are capable of dynamically changing queries and continuously handling data in IoT-based services.

  18. An Operational Urban Information System; Urban Affairs Paper No. 1.

    Science.gov (United States)

    Zody, Richard E.; Enlow, Ronald E.

    In a given urban area it is common that different public agencies and offices attempt to gather diverse data with no mutual coordination or awareness of each others' activities. This picture of varied and uncoordinated data needs reflects a lack of established information relationships and the need for an urban information system. In this study an…

  19. IPPF Co-operative Information Service (ICIS). August 1977.

    Science.gov (United States)

    International Planned Parenthood Federation, London (England).

    The pooling of documentation service resources has resulted in the creation of an International Planned Parenthood Federation (IPPF) integrated bibliographic information system. The former Library Bulletin has become IPPF Cooperative Information Service (ICIS). Entries in ICIS are classified according to the following nine categories: (0) General…

  20. IPPF Co-operative Information Service (ICIS). May 1977.

    Science.gov (United States)

    International Planned Parenthood Federation, London (England).

    The pooling of documentation service resources has resulted in the creation of an International Planned Parenthood Federation (IPPF) integrated bibliographic information system. Thus, the former Library Bulletin has become IPPF Cooperative Information Service (ICIS). This is the first such publication. Entries in ICIS are classified according to…

  1. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    architecture to reason about information security. ACM...least 6 by PI Chong) on Shill and related research, including at Cornell University, NII Shonan ( Japan ), and Brown University. o Postdoctoral Fellow...of application architecture to enforce high-level application-specific information security guarantees (Chong and van der Meyden, 2015), the use

  2. INFORMATIONAL APPLICATION FOR THE SUPPORT OF OPERATIONAL MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Rotaru Simona

    2008-05-01

    Full Text Available The development of the informational and communicational technology makes possible the use of a diversity of systems, instruments and technologies that offer to the decisional factors sharp and safe informations and also proper ways to process and analyse those informations in order to achieve an efficient development of their activities. We chose the internet - for theoretic and also for practical reasons - as informational technology because it stays at the base of other informational, decisional and communicational technologies - the intranet, the extranet, the web, the e-commerce, the groupware etc. Among the practical reasons we mention: low costs, fast communications and the performances inside the office and in relation with other people, especially with the clients; the market's development and the easier acquisition and fusion processes.

  3. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  4. Weather Information Services supporting Civilian UAS Operations Project

    Data.gov (United States)

    National Aeronautics and Space Administration — We build a system that supports the weather information needs of Unmanned Aircraft Systems (UAS) planning to fly in the National Airspace System (NAS). This weather...

  5. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  6. Distributed service-based approach for sensor data fusion in IoT environments.

    Science.gov (United States)

    Rodríguez-Valenzuela, Sandra; Holgado-Terriza, Juan A; Gutiérrez-Guerrero, José M; Muros-Cobos, Jesús L

    2014-10-15

    The Internet of Things (IoT) enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  7. Distributed Service-Based Approach for Sensor Data Fusion in IoT Environments

    Directory of Open Access Journals (Sweden)

    Sandra Rodríguez-Valenzuela

    2014-10-01

    Full Text Available The Internet of Things (IoT enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  8. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  9. Failure and Success of Jihadi Information Operations on the Internet

    Science.gov (United States)

    2013-12-01

    cause, no matter if there is no direct call for violent action. The theory of selective moral disengagement has been elaborated by Albert Bandura ... Alberts , D. S. (et al.). (2001). Understanding information age warfare. Washington, DC: National Defense University, Institute for National Strategic...Studies. Retrieved from: http://www.dodccrp.org/files/Alberts_UIAW.pdf. Alberts , D. S. (2002). Information age transformation: Getting to a 21st

  10. 76 FR 4993 - Agency Information Collection; Activity Under OMB Review; Report of Financial and Operating...

    Science.gov (United States)

    2011-01-27

    ... 104-13, the Bureau of Transportation Statistics invites the general public, industry and other... Bureau of Transportation Statistics Agency Information Collection; Activity Under OMB Review; Report of Financial and Operating Statistics for Small Aircraft Operators AGENCY: Bureau of Transportation...

  11. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    activities” ( CEMA ), which is a combination of Cyber and Electronic Warfare.115 However, the relationship between cyber and EW must be carefully considered...generating effects by themselves, as well as serving as a delivery means for MISO. The focus of CEMA may be as much to support combat operations

  12. Information Theory for Risk-based Water System Operation

    NARCIS (Netherlands)

    Weijs, S.V.

    2011-01-01

    Operational management of water resources needs predictions of future behavior of water systems, to anticipate shortage or excess of water in a timely manner. Because the natural systems that are part of the hydrological cycle are complex, the predictions inevitably are subject to considerable uncer

  13. Cooperation between information system development and operations: a literature review

    NARCIS (Netherlands)

    Erich, Floris; Amrit, Chintan; Daneva, Maya

    2014-01-01

    Software development can profit from improvements in the deployment and maintenance phases. DevOps improves these phases through a collection of principles and practices, centered around close collaboration between Development and Operations personnel. Both sides have paid little attention to issues

  14. A note on fairness in I/O automata

    NARCIS (Netherlands)

    Romijn, J.M.T.; Vaandrager, F.W.

    1995-01-01

    Notions of weak and strong fairness are studied in the setting of the I/O automaton model of Lynch & Tuttle. The concept of a fair I/O automaton is introduced and it is shown that a fair I/O automaton paired with the set of its fair executions is a live I/O automaton provided that (1) in each reacha

  15. Testing market informational efficiency of Constanta port operators

    Science.gov (United States)

    Roşca, E.; Popa, M.; Ruscă, F.; Burciu, Ş.

    2015-11-01

    The Romanian capital market is still an emergent one. Following the mass- privatization process and the private investments, three of the most important handling and storage companies acting in Constantza Port (OIL Terminal, Comvex and SOCEP) are listed on Romanian Stock Exchange. The paper investigates their evolution on the market, identifying the expected rate of return and the components of the shares risk (specific and systematic). Also, the price evolution could be analyzed through the informational efficiency which instantly reflects the price relevance. The Jarque-Bera normality test regarding the shares return rate distribution and the Fama test for the informational efficiency are completed for each company. The market price model is taken into consideration for price forecasting, computing the return rate auto-correlations. The results are subject of interpretation considering additional managerial and financial information of the companies’ activity.

  16. Uncertainty Measures in Ordered Information System Based on Approximation Operators

    Directory of Open Access Journals (Sweden)

    Bingjiao Fan

    2014-01-01

    Full Text Available This paper focuses on constructing uncertainty measures by the pure rough set approach in ordered information system. Four types of definitions of lower and upper approximations and corresponding uncertainty measurement concepts including accuracy, roughness, approximation quality, approximation accuracy, dependency degree, and importance degree are investigated. Theoretical analysis indicates that all the four types can be used to evaluate the uncertainty in ordered information system, especially that we find that the essence of the first type and the third type is the same. To interpret and help understand the approach, experiments about real-life data sets have been conducted to test the four types of uncertainty measures. From the results obtained, it can be shown that these uncertainty measures can surely measure the uncertainty in ordered information system.

  17. Case Studies on UN Information Operations: Ethiopia, Liberia, and Kosovo

    Science.gov (United States)

    2012-09-01

    Operations, 23 56Ibid., 24 57Ibid., 22 34 avenues of the media like popular music, soap operas , live radio or television programs with call-ins...also be used in IODP such as talk shows, cartoons, TV and radio dramas, comedy shows, quiz shows, soap operas , comic books, theatre presentations and...and education throughout this program have provided many insights that contributed to our success. xvi THIS PAGE INTENTIONALLY LEFT BLANK 0

  18. Information Operations, an Evolutionary Step for the Mexican Armed Forces

    Science.gov (United States)

    2007-12-01

    Institucional (PRI). It became Mexico’s "official" party which operated as a "true hegemonic party in the sense that, having itself achieved a de facto...8217expressing public 25 In 2000, the Partido Revolucionario Institucional (PRI) at the end of President...strategies of the National Development Plan Hacia un Estado Comunitario 2002- 2006 and its successor, Estado Comunitario: Desarrollo para Todos 2006-2010

  19. Operational Decisions: What is the Nature of the Information Required?

    Science.gov (United States)

    1987-05-21

    ground and a decisive battle would be fought between the Chindwin and Irrawaddy River with the city of Mandalay in the balance, Slim was In error, He...with elements of the IV Corps and continue the advance toward the Irrawaddy River giving every 1r,-.,.:.’tion that Mandalay was the objective of the 14th...Corps would cross the Irrawaddy and seize Mandalay without the threat of the Japanese defense being reinforced. A subsequent phase of the operation was

  20. IPPF Co-operative Information Service (ICIS). November 1977.

    Science.gov (United States)

    International Planned Parenthood Federation, London (England).

    This ICIS bulletin replaces the formal Library Bulletin of the International Planned Parenthood Federation (IPPF). It represents the integration of a bibliographic information network. Entries in ICIS are classified according to the following nine categories: (0) General Reference; (1) IPPF; (2) Family Planning and Health Care; (3) Biomedical…

  1. IPPF Co-operative Information Service (ICIS). November 1978.

    Science.gov (United States)

    International Planned Parenthood Federation, London (England).

    This is a bibliography of family planning material available from the International Planned Parenthood Cooperative Information Service library and documentation services. Entries are made under the following categories: reference books, biographies, family planning and bio-medical science, social sciences related to family planning, international…

  2. IPPF Co-operative Information Service (ICIS). February 1978.

    Science.gov (United States)

    International Planned Parenthood Federation, London (England).

    This publication is a catalogue of document descriptions that may be of use to national family planning/population organizations. The International Planned Parenthood Federation (IPPF) Cooperative Information Service (ICIS) has developed this quarterly series as a service to population documentation centers so that these centers can acquire the…

  3. Information transfer during contingency operations: Emergency air-ground communications

    Science.gov (United States)

    Porter, R. F.

    1981-01-01

    Safety related problems are reported which occur as a consequence of information transfer deficiencies that arise when air/ground communications are (or should be) used as a resource in inflight emergency situations. The system factors, the human errors, and the associated causes of these problem are defined.

  4. Difficulties for the development and principles for the promotion of IoT industry in the new era——an interpretation of “The 12th Five-Year Plan for the Development of IoT Industry” by the Ministry of Industry and Information Technology%新时代下物联网产业的发展困境与推进原则——工信部《物联网“十二五”发展规划》解读

    Institute of Scientific and Technical Information of China (English)

    叶美兰; 朱卫未

    2012-01-01

    2012年2月14日,工业与信息化正式发布了《物联网"十二五"发展规划》,这是物联网首次国家层面上的产业整体发展规划。物联网产业是战略性新兴产业的重要一项,对于加快转变经济发展方式,推动相关产业转型升级具有重要作用。本规划的推出将会引导各级政府进行物联网产业发展布局,争取形成新一代信息技术产业发展的合力,推动我国经济在十二五阶段更快更稳发展。%"The 12th Five-Year Plan for the Development of Internet of Things Industry" officially released by the Ministry of Industry and Information Technology on Feb.14,2012 is the first national level development plan for IoT industry.As an important strategic new industry,IoT will play significant roles in accelerating the transformation of economic development and promote the transformation and upgrading of relevant industries.The launch of this Plan will guide governments at all levels to arrange for IoT development,strive together to form a new driving force for the new generation information technology industry,and promote for a faster and more stable development of Chinese economy in "the 12th Five-Year Period".

  5. I/O Performance of an RAID-10 Style Parallel File System

    Institute of Scientific and Technical Information of China (English)

    Dan Feng; Hong Jiang; Yi-Feng Zhu

    2004-01-01

    Without any additional cost, all the disks on the nodes of a cluster can be connected together through CEFT-PVFS, an RAID-10 style parallel file system, to provide a multi-GB/s parallel I/O performance.I/O response time is one of the most important measures of quality of service for a client. When multiple clients submit data-intensive jobs at the same time, the response time experienced by the user is an indicator of the power of the cluster. In this paper, a queuing model is used to analyze in detail the average response time when multiple clients access CEFT-PVFS. The results reveal that response time is with a function of several operational parameters. The results show that I/O response time decreases with the increases in I/O buffer hit rate for read requests, write buffer size for write requests and the number of server nodes in the parallel file system, while the higher the I/O requests arrival rate, the longer the I/O response time. On the other hand, the collective power of a large cluster supported by CEFT-PVFS is shown to be able to sustain a steady and stable I/O response time for a relatively large range of the request arrival rate.

  6. Active Storage with Analytics Capabilities and I/O Runtime System for Petascale Systems

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States)

    2015-03-18

    Computational scientists must understand results from experimental, observational and computational simulation generated data to gain insights and perform knowledge discovery. As systems approach the petascale range, problems that were unimaginable a few years ago are within reach. With the increasing volume and complexity of data produced by ultra-scale simulations and high-throughput experiments, understanding the science is largely hampered by the lack of comprehensive I/O, storage, acceleration of data manipulation, analysis, and mining tools. Scientists require techniques, tools and infrastructure to facilitate better understanding of their data, in particular the ability to effectively perform complex data analysis, statistical analysis and knowledge discovery. The goal of this work is to enable more effective analysis of scientific datasets through the integration of enhancements in the I/O stack, from active storage support at the file system layer to MPI-IO and high-level I/O library layers. We propose to provide software components to accelerate data analytics, mining, I/O, and knowledge discovery for large-scale scientific applications, thereby increasing productivity of both scientists and the systems. Our approaches include 1) design the interfaces in high-level I/O libraries, such as parallel netCDF, for applications to activate data mining operations at the lower I/O layers; 2) Enhance MPI-IO runtime systems to incorporate the functionality developed as a part of the runtime system design; 3) Develop parallel data mining programs as part of runtime library for server-side file system in PVFS file system; and 4) Prototype an active storage cluster, which will utilize multicore CPUs, GPUs, and FPGAs to carry out the data mining workload.

  7. Fisher information, Borges operators, and q-calculus

    Science.gov (United States)

    Pennini, F.; Plastino, A.; Ferri, G. L.

    2008-10-01

    We discuss applying the increasingly popular q-calculus, or deformed calculus, so as to suitably generalize Fisher’s information measure and the Cramer-Rao inequality. A q-deformation can be attained in multiple ways, and we show that most of them do not constitute legitimate procedures. Within such a context, the only completely acceptable q-deformation is that ensuing from using the so-called Borges derivative [E.P. Borges, Physica A 340 (2004) 95].

  8. Semantics-based distributed I/O for mpiBLAST.

    Energy Technology Data Exchange (ETDEWEB)

    Balaji, P.; Feng, W.; Archuleta, J.; Lin, H.; Kettimuthu, R.; Thakur, R.; Ma, X.; Mathematics and Computer Science; Virginia Tech; North Carolina State Univ.; ORNL

    2008-01-01

    BLAST is a widely used software toolkit for genomic sequence search. mpiBLAST is a freely available, open-source parallelization of BLAST that uses database segmentation to allow different worker processes to search (in parallel) unique segments of the database. After searching, the workers write their output to a filesystem. While mpiBLAST has been shown to achieve high performance in clusters with fast local filesystems, its I/O processing remains a concern for scalability, especially in systems having limited I/O capabilities such as distributed filesystems spread across a wide-area network. Thus, we present ParaMEDIC - a novel environment that uses application-specific semantic information to compress I/O data and improve performance in distributed environments. Specifically, for mpiBLAST, ParaMEDIC partitions worker processes into compute and I/O workers. Compute workers, instead of directly writing the output to the filesystem, the workers process the output using semantic knowledge about the application to generate metadata and write the metadata to the filesystem. I/O workers, which physically reside closer to the actual storage, then process this metadata to re-create the actual output and write it to the filesystem. This approach allows ParaMEDIC to reduce I/O time, thus accelerating mpiBLAST by as much as 25-fold.

  9. Secure Information Exchange Gateway for Electric Grid Operations

    Energy Technology Data Exchange (ETDEWEB)

    Robertson, F. Russell [Grid Protection Alliance, Chattanooga, TN (United States); Carroll, J. Ritchie [Grid Protection Alliance, Chattanooga, TN (United States); Sanders, William [Univ. of Illinois, Urbana-Champaign, IL (United States); Yardley, Timothy [Univ. of Illinois, Urbana-Champaign, IL (United States); Heine, Erich [Univ. of Illinois, Urbana-Champaign, IL (United States); Hadley, Mark [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McKinnon, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Motteler, Barbara [Alstom Grid Inc., Levallois-Perret Cedex (France); Giri, Jay [Grid Protection Alliance, Chattanooga, TN (United States); Walker, William [PJM Interconnection (PJM), Norristown, PA (United States); McCartha, Esrick [PJM Interconnection (PJM), Norristown, PA (United States)

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  10. 76 FR 3175 - Proposed Extension of Existing Information Collection; Hoist Operators' Physical Fitness

    Science.gov (United States)

    2011-01-19

    ...' Physical Fitness AGENCY: Mine Safety and Health Administration, Labor. ACTION: Notice of request for public... collection of information in 30 CFR 56.19057 and 57.19057--Hoist Operators' Physical Fitness. MSHA does not... extension of the information collection for 30 CFR 56.19057 and 57.19057 on hoist operators'...

  11. Information theory-based approach for modeling the cognitive behavior of NPP operators

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jong Hyun; Seong, Poong Hyun [KAIST, Taejon (Korea, Republic of)

    2001-10-01

    An NPP system consists of three important components: the machine system, operators, and MMI. Through the MMI, operators monitor and control the plant system. The cognitive model of NPP operators has become a target of modeling by cognitive engineers due to their work environment: complex, uncertain, and safe critical. We suggested the contextual model for the cognitive behavior of NPP operator and the mathematical fundamentals based on information theory which can quantify the model. The demerit of the methodology using the information theory is that it cannot evaluate the correctness and quality of information. Therefore, the validation through the experiment is needed.

  12. Design and Implementation of Henan Huinong Client System Based on iOS

    Directory of Open Access Journals (Sweden)

    Li Yan-Ling

    2016-01-01

    Full Text Available In order to meet the demands of customers related to agriculture who can obtain some Comprehensive agricultural information service of Henan Province through the intelligent mobile terminal, on the base of the Zhong yuan Rural Information Port integrated platform, employing IOS, Java, Eclipse, XML, SAX technology, we designed and developed Henan Huinong client systems based on ios mobile terminal. This system has achieved the multiple applications, such as agricultural information browsing, network consulting, expert online, crop rermote diagnosis and so on.

  13. 76 FR 58540 - Proposed Information Collection Request of the ETA 581, Contribution Operations Report; Extension...

    Science.gov (United States)

    2011-09-21

    ... Information Collection Request of the ETA 581, Contribution Operations Report; Extension Without Change AGENCY... Insurance (OUI) of the Employment and Training Administration (ETA) has responsibility for the Tax... Contribution Operations report (Form ETA 581) is a comprehensive report of each state's UI tax operations...

  14. 47 CFR 25.263 - Information sharing requirements for SDARS terrestrial repeater operators.

    Science.gov (United States)

    2010-10-01

    ... terrestrial repeater operators. 25.263 Section 25.263 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... requirements for SDARS terrestrial repeater operators. This section requires SDARS licensees in the 2320-2345 MHz band to share information regarding the location and operation of terrestrial repeaters with...

  15. AUDIT DISCLOSURE OF MATERIAL INFORMATION ON OPERATING SEGMENTS THE ACTIVITIES OF THE ORGANIZATIONS OF TOURIST SPHERE

    Directory of Open Access Journals (Sweden)

    Екатерина Николаевна Скорикова

    2013-04-01

    Full Text Available In modern conditions market economy for take decisions of use services tourist organizations, users not enough relevant information of financial result activities.The article considered audit disclosure relevant information on operating segments activities, for example tourist organizations.In result research considered operating segments on current and discontinued activities, and their impact on disclosure relevant information of financial result.Proposed option disclosure relevant information on operating segments activities in explanatory Note to the annual financial statements.Received results prove, that information on operating segments activities essential in all aspects.Results research has as theoretical so and practical significance, and can used at further development theoretical and practical questions on disclosure relevant information of activities organizations of tourist sphere.DOI: http://dx.doi.org/10.12731/2218-7405-2013-1-2

  16. AUDIT DISCLOSURE OF MATERIAL INFORMATION ON OPERATING SEGMENTS THE ACTIVITIES OF THE ORGANIZATIONS OF TOURIST SPHERE

    Directory of Open Access Journals (Sweden)

    Skorikova Ekaterina Nikolaevna

    2013-01-01

    Full Text Available In modern conditions market economy for take decisions of use services tourist organizations, users not enough relevant information of financial result activities. The article considered audit disclosure relevant information on operating segments activities, for example tourist organizations. In result research considered operating segments on current and discontinued activities, and their impact on disclosure relevant information of financial result. Proposed option disclosure relevant information on operating segments activities in explanatory Note to the annual financial statements. Received results prove, that information on operating segments activities essential in all aspects. Results research has as theoretical so and practical significance, and can used at further development theoretical and practical questions on disclosure relevant information of activities organizations of tourist sphere.

  17. Design of IO - Link Communication Slave Device%IO- Link通信从站的设计

    Institute of Scientific and Technical Information of China (English)

    谢倩; 胡仁杰

    2011-01-01

    In order to study IO-Link system architecture,communication mechanism,development and application , the IO - Link slave toolkit including IO - Link general development board (or IO - Link slave device) , analysis tools and IO- Link slave stack can be designed. The IO - Link slave toolkit was introduced,and the design proposal of IO - Link slave device acting as the foundation and core modules of the slave toolkit was described. A demonstration system was built and the test results validate the software and hardware design. The IO - Link slave device is of great importance for studing IO - Link system, IO - Link communication and subsequent development of the slave toolkit.%为了研究IO - Link系统结构、通信机制以及开发应用,可设计包括IO- Link通用开发模块(或IO-Link通信从站)、分析工具以及从机协议栈在内的IO - Link从机工具包.介绍了IO - Link从机工具包系统,给出了作为从机工具包基础和核心模块的IO - Link从站的设计方案并构建了演示系统,测试结果验证了IO - Link从站软硬件设计的正确性.IO - Link从站的设计对于研究IO - Link系统、通信模式以及从机开发包的后续开发有着重要意义.

  18. Developing an M-Learning Application for iOS

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2013-01-01

    Full Text Available The mobile market development has a high impact on all domains including education. Smart mobile devices started to be affordable and the massive use on educational processes does not seem to be too far. Mobile learning applications are be targeted for all major mobile operating systems as native applications or Web-based. The objective of this paper is to present the implementation of the evaluation module for an m-learning application developed for iOS devices. The m-learning application is targeted to a higher education institution. The application uses Web services in order to obtain the content and to authenticate the users.

  19. [Design and Implementation of a Mobile Operating Room Information Management System Based on Electronic Medical Record].

    Science.gov (United States)

    Liu, Baozhen; Liu, Zhiguo; Wang, Xianwen

    2015-06-01

    A mobile operating room information management system with electronic medical record (EMR) is designed to improve work efficiency and to enhance the patient information sharing. In the operating room, this system acquires the information from various medical devices through the Client/Server (C/S) pattern, and automatically generates XML-based EMR. Outside the operating room, this system provides information access service by using the Browser/Server (B/S) pattern. Software test shows that this system can correctly collect medical information from equipment and clearly display the real-time waveform. By achieving surgery records with higher quality and sharing the information among mobile medical units, this system can effectively reduce doctors' workload and promote the information construction of the field hospital.

  20. 42 CFR 433.116 - FFP for operation of mechanized claims processing and information retrieval systems.

    Science.gov (United States)

    2010-10-01

    ... FISCAL ADMINISTRATION Mechanized Claims Processing and Information Retrieval Systems § 433.116 FFP for operation of mechanized claims processing and information retrieval systems. (a) Subject to 42 CFR 433.113(c... and information retrieval systems. 433.116 Section 433.116 Public Health CENTERS FOR...

  1. 76 FR 17145 - Agency Information Collection Activities: Business Transformation-Automated Integrated Operating...

    Science.gov (United States)

    2011-03-28

    ... Operating Environment (IOE) to process benefit applications. The IOE will collect information by asking... and assumptions used; (3) Enhance the quality, utility, and clarity of the information to be collected... SECURITY U.S. Citizenship and Immigration Services Agency Information Collection Activities:...

  2. Making the most of data: An information selection and assessment framework to improve water systems operations

    Science.gov (United States)

    Giuliani, M.; Pianosi, F.; Castelletti, A.

    2015-11-01

    Advances in Environmental monitoring systems are making a wide range of data available at increasingly higher temporal and spatial resolution. This creates an opportunity to enhance real-time understanding of water systems conditions and to improve prediction of their future evolution, ultimately increasing our ability to make better decisions. Yet, many water systems are still operated using very simple information systems, typically based on simple statistical analysis and the operator's experience. In this work, we propose a framework to automatically select the most valuable information to inform water systems operations supported by quantitative metrics to operationally and economically assess the value of this information. The Hoa Binh reservoir in Vietnam is used to demonstrate the proposed framework in a multiobjective context, accounting for hydropower production and flood control. First, we quantify the expected value of perfect information, meaning the potential space for improvement under the assumption of exact knowledge of the future system conditions. Second, we automatically select the most valuable information that could be actually used to improve the Hoa Binh operations. Finally, we assess the economic value of sample information on the basis of the resulting policy performance. Results show that our framework successfully select information to enhance the performance of the operating policies with respect to both the competing objectives, attaining a 40% improvement close to the target trade-off selected as potentially good compromise between hydropower production and flood control.

  3. Using Cyber Capabilities to Inform and Influence

    Science.gov (United States)

    2012-12-01

    Activities SNS – Social Networking Services TA – Target Audience TAA – Target Audience Analysis IOInformation Operations MILDEC – Military Deception ...Military Deception (MILDEC) to influence, and Public Affairs (PA) to inform specific target audiences based on the current needs of the command. 1...prevent online fraud within the marketplaces and in the future “the growth of infrastructure-as-a-service clouds, such as Amazon’s EC2 service, may

  4. IoTFLiP: IoT-based flipped learning platform for medical education

    Directory of Open Access Journals (Sweden)

    Maqbool Ali

    2017-08-01

    Full Text Available Case-Based Learning (CBL has become an effective pedagogy for student-centered learning in medical education, which is founded on persistent patient cases. Flippped learning and Internet of Things (IoTs concepts have gained significant attention in recent years. Using these concepts in conjunction with CBL can improve learning ability by providing real evolutionary medical cases. It also enables students to build confidence in their decision making, and efficiently enhances teamwork in the learing environment. We propose an IoT-based Flip Learning Platform, called IoTFLiP, where an IoT infrastructure is exploited to support flipped case-based learning in a cloud environment with state of the art security and privacy measures for personalized medical data. It also provides support for application delivery in private, public, and hybrid approaches. The proposed platform is an extension of our Interactive Case-Based Flipped Learning Tool (ICBFLT, which has been developed based on current CBL practices. ICBFLT formulates summaries of CBL cases through synergy between students' and medical expert knowledge. The low cost and reduced size of sensor device, support of IoTs, and recent flipped learning advancements can enhance medical students' academic and practical experiences. In order to demonstrate a working scenario for the proposed IoTFLiP platform, real-time data from IoTs gadgets is collected to generate a real-world case for a medical student using ICBFLT.

  5. Shuttle Ground Operations Efficiencies/Technologies Study (SGOE/T). Volume 5: Technical Information Sheets (TIS)

    Science.gov (United States)

    Scholz, A. L.; Hart, M. T.; Lowry, D. J.

    1987-01-01

    The Technology Information Sheet was assembled in database format during Phase I. This document was designed to provide a repository for information pertaining to 144 Operations and Maintenance Instructions (OMI) controlled operations in the Orbiter Processing Facility (OPF), Vehicle Assembly Building (VAB), and PAD. It provides a way to accumulate information about required crew sizes, operations task time duration (serial and/or parallel), special Ground Support Equipment (GSE). required, and identification of a potential application of existing technology or the need for the development of a new technolgoy item.

  6. Professional iOS database application programming

    CERN Document Server

    Alessi, Patrick

    2013-01-01

    Updated and revised coverage that includes the latest versions of iOS and Xcode Whether you're a novice or experienced developer, you will want to dive into this updated resource on database application programming for the iPhone and iPad. Packed with more than 50 percent new and revised material - including completely rebuilt code, screenshots, and full coverage of new features pertaining to database programming and enterprise integration in iOS 6 - this must-have book intends to continue the precedent set by the previous edition by helping thousands of developers master database

  7. The State of the Art in Information Handling. Operation PEP/Executive Information Systems.

    Science.gov (United States)

    Summers, J. K.; Sullivan, J. E.

    This document explains recent developments in computer science and information systems of interest to the educational manager. A brief history of computers is included, together with an examination of modern computers' capabilities. Various features of card, tape, and disk information storage systems are presented. The importance of time-sharing…

  8. Hanford Environmental Information System (HEIS). Volume 2, Operator`s guide

    Energy Technology Data Exchange (ETDEWEB)

    1994-01-14

    This report discusses the procedures that establish the configuration control processes for the Hanford Environmental Information System (HEIS) software. The procedures also provide the charter and function of the HEIS Configuration Control Board (CCB) for maintaining software. The software configuration control items covered under these procedures include the HEIS software and database structure. The configuration control processes include both administrative and audit functions. The administrative role includes maintaining the overall change schedule, ensuring consistency of proposed changes, negotiating change plan adjustments, setting priorities, and tracking the status of changes. The configuration control process audits to ensure that changes are performed to applicable standards.

  9. Flexible and adaptive water systems operations through more informed and dynamic decisions

    Science.gov (United States)

    Castelletti, A.; Giuliani, M.

    2016-12-01

    Timely adapting the operations of water systems to be resilient against rapid changes in both hydroclimatic and socioeconomic forcing is generally recommended as a part of planning and managing water resources under uncertain futures. A great opportunity to make the operations more flexible and adaptive is offered by the unprecedented amount of information that is becoming available to water system operators, providing a wide range of data at increasingly higher temporal and spatial resolution. Yet, many water systems are still operated using very simple information systems, typically based on basic statistical analysis and the operator's experience. In this work, we discuss the potential offered by incorporating improved information to enhance water systems operation and increase their ability of adapting to different external conditions and resolving potential conflicts across sectors. In particular, we focus on the use of different variables associated to different dynamics of the system (slow and fast) diversely impacting the operating objectives on the short-, medium- and long-term. The multi-purpose operations of the Hoa Binh reservoir in the Red River Basin (Vietnam) is used to demonstrate our approach. Numerical results show that our procedure is able to automatically select the most valuable information for improving the Hoa Binh operations and mitigating the conflict between short-term objectives, i.e. hydropower production and flood control. Moreover, we also successfully identify low-frequency climate information associated to El-Nino Southern Oscillation for improving the performance in terms of long-term objectives, i.e. water supply. Finally, we assess the value of better informing operational decisions for adapting the system operations to changing conditions by considering different climate change projections.

  10. Linear SVM-Based Android Malware Detection for Reliable IoT Services

    Directory of Open Access Journals (Sweden)

    Hyo-Sik Ham

    2014-01-01

    Full Text Available Current many Internet of Things (IoT services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. In most cases, mobile devices have become cluttered with important personal user information as various services and contents are provided through them. Accordingly, attackers are expanding the scope of their attacks beyond the existing PC and Internet environment into mobile devices. In this paper, we apply a linear support vector machine (SVM to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. Through experimental validation, we show that the SVM outperforms other machine learning classifiers.

  11. Modular HPC I/O characterization with Darshan

    Energy Technology Data Exchange (ETDEWEB)

    Snyder, Shane; Carns, Philip; Harms, Kevin; Ross, Robert; Lockwood, Glenn K.; Wright, Nicholas J.

    2016-11-13

    Contemporary high-performance computing (HPC) applications encompass a broad range of distinct I/O strategies and are often executed on a number of different compute platforms in their lifetime. These large-scale HPC platforms employ increasingly complex I/O subsystems to provide a suitable level of I/O performance to applications. Tuning I/O workloads for such a system is nontrivial, and the results generally are not portable to other HPC systems. I/O profiling tools can help to address this challenge, but most existing tools only instrument specific components within the I/O subsystem that provide a limited perspective on I/O performance. The increasing diversity of scientific applications and computing platforms calls for greater flexibililty and scope in I/O characterization.

  12. Influencing Tomorrow: A Study of Emerging Influence Techniques and Their Relevance to United States Information Operations

    Science.gov (United States)

    2015-06-12

    groups and governmental institutions; the possibility of economic loss directed at entrepreneurs; or the prospect of United States undue influence or... INFLUENCING TOMORROW: A STUDY OF EMERGING INFLUENCE TECHNIQUES AND THEIR RELEVANCE TO UNITED STATES INFORMATION OPERATIONS A...

  13. Organizational structure and operation of defense/aerospace information centers in the United States of America

    Science.gov (United States)

    Sauter, H. E.; Lushina, L. N.

    1983-01-01

    U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.

  14. Evaluation of display technologies for Internet of Things (IoT)

    Science.gov (United States)

    Sabo, Julia; Fegert, Tobias; Cisowski, Matthäus Stephanus; Marsal, Anatolij; Eichberger, Domenik; Blankenbach, Karlheinz

    2017-02-01

    Internet of Things (IoT) is a booming industry. We investigated several (semi-) professional IoT devices in combination with displays (focus on reflective technologies) and LEDs. First, these displays were compared for reflectance and ambient light performance. Two measurement set-ups with diffuse conditions were used for simulating typical indoor lighting conditions of IoT displays. E-paper displays were evaluated best as they combine a relative high reflectance with large contrast ratio. Reflective monochrome LCDs show a lower reflectance but are widely available. Second we studied IoT microprocessors interfaces to displays. A µP can drive single LEDs and one or two Seg 8 LED digits directly by GPIOs. Other display technologies require display controllers with a parallel or serial interface to the microprocessor as they need dedicated waveforms for driving the pixels. Most suitable are display modules with built-in display RAM as only pixel data have to be transferred which changes. A HDMI output (e.g. Raspberry Pi) results in high cost for the displays, therefore AMLCDs are not suitable for low to medium cost IoT systems. We compared and evaluated furthermore status indicators, icons, text and graphics IoT display systems regarding human machine interface (HMI) characteristics and effectiveness as well as power consumption. We found out that low resolution graphics bistable e-paper displays are the most appropriate display technology for IoT systems as they show as well information after a power failure or power switch off during maintenance or e.g. QR codes for installation. LED indicators are the most cost effective approach which has however very limited HMI capabilities.

  15. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...... of knowledge on IoT and pinpointing the most influential ideas to-date on the topic....

  16. Market Information and Signaling in Central Bank Operations, or, How Often Should a Central Bank Intervene?

    OpenAIRE

    International Monetary Fund

    1997-01-01

    A central bank must decide on the frequency with which it will conduct open market operations and the variability in short-term money market that it will allow. The paper shows how the optimal operating procedure balances the value of attaining an immediate target and broadcasting the central bank's intentions against the informational advantages to the central bank of allowing the free play of market forces to reveal more of the information available to market participants.

  17. Market Information and Signaling in Central Bank Operations, or, How Often Should a Central Bank Intervene?

    OpenAIRE

    International Monetary Fund

    1997-01-01

    A central bank must decide on the frequency with which it will conduct open market operations and the variability in short-term money market that it will allow. The paper shows how the optimal operating procedure balances the value of attaining an immediate target and broadcasting the central bank's intentions against the informational advantages to the central bank of allowing the free play of market forces to reveal more of the information available to market participants.

  18. Combining Operations Management and Information Systems Curricula: Assessing Alumni Preparations for the Workforce

    Science.gov (United States)

    Silva, David; McFadden, Kathleen L.

    2005-01-01

    The purpose of this study is to explore how well a curriculum that combines operations management and information systems uniquely prepares students for the workforce. To address our research questions, a Web-based survey was developed. We sent our survey to 203 alumni that graduated from the Department of Operations Management and Information…

  19. 78 FR 64526 - Information Collection Activities: Sulphur Operations; Submitted for Office of Management and...

    Science.gov (United States)

    2013-10-29

    ...; 134E1700D2 EEEE500000 ET1SF0000.DAQ000] Information Collection Activities: Sulphur Operations; Submitted for Office of Management and Budget (OMB) Review; Comment Request ACTION: 30-day Notice. SUMMARY: To comply... regulations under Subpart P, Sulphur Operations. This notice also provides the public a second opportunity...

  20. Improving machine operation management efficiency via improving the vehicle park structure and using the production operation information database

    Science.gov (United States)

    Koptev, V. Yu

    2017-02-01

    The work represents the results of studying basic interconnected criteria of separate equipment units of the transport network machines fleet, depending on production and mining factors to improve the transport systems management. Justifying the selection of a control system necessitates employing new methodologies and models, augmented with stability and transport flow criteria, accounting for mining work development dynamics on mining sites. A necessary condition is the accounting of technical and operating parameters related to vehicle operation. Modern open pit mining dispatching systems must include such kinds of the information database. An algorithm forming a machine fleet is presented based on multi-variation task solution in connection with defining reasonable operating features of a machine working as a part of a complex. Proposals cited in the work may apply to mining machines (drilling equipment, excavators) and construction equipment (bulldozers, cranes, pile-drivers), city transport and other types of production activities using machine fleet.

  1. FY06 I/O Integration Blueprint

    Energy Technology Data Exchange (ETDEWEB)

    Cupps, K; Fitzgerald, K; Gary, M; Shoopman, J; Hamilton, P; Loewe, B; Slavec, J; Smith, D; Fox, D; Southard, D; Wiltzuis, D; Allen, J; Bass, N; Boas, B; Connell, T; East, D; Gorda, B; Lawver, B; Louis, S; Quinn, T; Seager, M

    2006-04-06

    This document provides an understanding of the near and long term computing and I/O resources in the Secure Computing Facility (SCF) and Open Computing Facility (OCF). Requirements for data flows, storage capacities and transfer rates are determined. Recommendations are made for architectures, timeframes for major deliverables, and procurements for the next fiscal year.

  2. FY07 I/O Integration Blueprint

    Energy Technology Data Exchange (ETDEWEB)

    Wiltzius, D P; Gary, M R

    2006-12-28

    This document provides an understanding of the near and long term computing and I/O resources in the Secure Computing Facility (SCF) and Open Computing Facility (OCF). Requirements for data flows, storage capacities and transfer rates are determined. Recommendations are made for architectures, timeframes for major deliverables, and procurements for the next fiscal year.

  3. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  4. Diskless supercomputers: Scalable, reliable I/O for the Tera-Op technology base

    Science.gov (United States)

    Katz, Randy H.; Ousterhout, John K.; Patterson, David A.

    1993-01-01

    Computing is seeing an unprecedented improvement in performance; over the last five years there has been an order-of-magnitude improvement in the speeds of workstation CPU's. At least another order of magnitude seems likely in the next five years, to machines with 500 MIPS or more. The goal of the ARPA Teraop program is to realize even larger, more powerful machines, executing as many as a trillion operations per second. Unfortunately, we have seen no comparable breakthroughs in I/O performance; the speeds of I/O devices and the hardware and software architectures for managing them have not changed substantially in many years. We have completed a program of research to demonstrate hardware and software I/O architectures capable of supporting the kinds of internetworked 'visualization' workstations and supercomputers that will appear in the mid 1990s. The project had three overall goals: high performance, high reliability, and scalable, multipurpose system.

  5. Interference-Aware Opportunistic Dynamic Energy Saving Mechanism for Wi-Fi Enabled IoTs

    Directory of Open Access Journals (Sweden)

    Il-Gu Lee

    2017-07-01

    Full Text Available The wireless local area network (WLAN is one of the most popular wireless technologies offering connectivity today, and one of the candidates for the internet of things (IoTs. However, WLAN’s inefficiency in terms of complexity and relatively large power consumption compared with other wireless standards has been reported as a major barrier for IoTs applications. This paper proposes an interference-aware opportunistic dynamic energy saving mechanism to improve energy efficiency for Wi-Fi enabled IoTs. The proposed scheme optimizes operating clock frequencies adaptively for signal processing when the mobile station transmits packets in partial sub-channels. Evaluation results demonstrate that the proposed scheme improves energy efficiency by approximately 34%.

  6. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  7. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  8. COHERENT INFORMATION ON THERMAL RADIATION NOISE CHANNEL: AN APPROACH OF INTEGRAL WITHIN ORDERED PRODUCT OF OPERATORS

    Institute of Scientific and Technical Information of China (English)

    陈小余; 仇佩亮

    2001-01-01

    An analytical expression is given to the coherent information of the thermal radiation signal transmitted over the thermal radiation noise channel, one of the most essential quantum Gaussian channels. Focusing on the single normal mode of the thermal radiation signal and noise, we resolve the entangled state density operator, which characterizes quantum information transmission, into a direct product of two parts, with each part being a thermal radiation density operator. The calculation is aided by the technique known as "integral within ordered product of operators".

  9. KZ1——A Prototype of Intelligent Operating System

    Institute of Scientific and Technical Information of China (English)

    谢立; 孙钟秀; 等

    1991-01-01

    This paper proposes an intelligent Operating System (IOS) as the next generation operating system.IOS integrates operating system with artificial intelligence technology,and its key feature is an intelligent man-machine communication mechanism which makes the computer systems more friendly.The concepts,functions and architecture of IOS are introduced and an experimental IOS called KZ1 is described in detail.

  10. 75 FR 15718 - MMS Information Collection Activity: 1010-0086, Sulphur Operations, Extension of a Collection...

    Science.gov (United States)

    2010-03-30

    ... Minerals Management Service MMS Information Collection Activity: 1010-0086, Sulphur Operations, Extension... of extension of an information collection (1010-0086). SUMMARY: To comply with the Paperwork...; Herndon, Virginia 20170-4817. Please reference ICR 1010-0086 in your comment and include your name...

  11. A data model for operational and situational information in emergency response: the Dutch case

    NARCIS (Netherlands)

    Zlatanova, S.; Dilo, A.

    2010-01-01

    During emergency response a lot of dynamic information is created and needs to be studied and analysed in the decision-making process. However, this analysis of data is difficult and often not possible. A major reason for this is that a lot of information coming from the field operations is not arch

  12. A data model for operational and situational information in emergency response: the Dutch case

    NARCIS (Netherlands)

    Zlatanova, S.; Dilo, Arta

    2010-01-01

    During emergency response a lot of dynamic information is created and needs to be studied and analysed in the decision-making process. However, this analysis of data is difficult and often not possible. A major reason for this is that a lot of information coming from the field operations is not

  13. Aplikasi Keliling Nusantara Edisi Sumatera Berbasis Android dan iOS

    Directory of Open Access Journals (Sweden)

    Angga Apridianto

    2015-08-01

    Full Text Available Diversity of art and culture in Indonesia should be preserved so as not to become extinct in the face of times so that it can be passed on to generations to come. Many of the people of Indonesia who forget about the culture to identity of the area because of several factors such as the people of indonesia more interested of the western culture than self culture, the region of Indonesia which large also cause people’s reluctance to learn because of constrained of time, distance and cost as well as limitations of the media information about the art and culture that currently can only be learned through pictures and visit the location of art and culture directly make the introduction of art and culture to people of indonesia not yet optimal. Therefore required a media so that people can learn more about the wealth of art and culture without having to visit directly into the location of the arts and cultures its. “Keliling Nusantara Edisi Sumatra” application that was built can be the way to preserve the national culture. The function of this application as a learning media for recognize the diversity of arts and cultures of Indonesia on the island of Sumatra. This application is built using Mobione Studio and running on Android and iOS devices. The application is made using the UCD (User Centered Design which has been mapped to multimedia development methods by Luther from the stage specify the context of use and specify the users and organisational requirements are mapped into the concept, the stage produce design solutions are mapped into the design, production and collecting material as wellas the evaluate design againts the user requirements are mapped into the stage of testing and distribution. The results produced an application based on Android and iOS contains folks song and lyrics and sound, traditional dress, traditional homes, custom traditions, traditional weapons, traditional dance, tradition musical instrument, the symbol of the

  14. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  15. Mission Accomplished! Or Not? A Study about Success in Information Operations

    Science.gov (United States)

    2012-09-01

    Hollandaise sauce . 60 effective directives, and as a result make it more difficult to predict the outcome of an information operation and optimize...broadcast media. Initially a thorough examination of the origin of the webpage is necessary. Registration and use of a domain name that sounds...the sources are, and if the actual information is altered from the original source. It is also crucial to find the reason why the information is

  16. 智能物联网终端操作系统与生态环境研究%Research on Smart IoT Terminal Operating System and the Ecological Environment

    Institute of Scientific and Technical Information of China (English)

    周晓龙; 王芃; 游思佳; 邸青玥

    2013-01-01

    深入分析物联网终端智能化的趋势,并从智能操作系统、终端开发、应用开发以及通用应用平台等层面提出智能物联网终端操作系统与生态环境方案,为智能物联网终端及应用发展提供借鉴和参考。%This paper analyzes the development trend of smart Iot terminal, proposes a scheme for smart Iot terminal operating system and the ecological environment from smartphone operation system, terminal exploration, application exploration and universal application platform. It aims to provide references for the development of smart Iot terminal and the application.

  17. Use of Traffic Intent Information by Autonomous Aircraft in Constrained Operations

    Science.gov (United States)

    Wing, David J.; Barmore, Bryan E.; Krishnamurthy, Karthik

    2002-01-01

    This paper presents findings of a research study designed to provide insight into the issue of intent information exchange in constrained en-route air-traffic operations and its effect on pilot decision-making and flight performance. The piloted simulation was conducted in the Air Traffic Operations Laboratory at the NASA Langley Research Center. Two operational modes for autonomous flight management were compared under conditions of low and high operational complexity (traffic and airspace hazard density). The tactical mode was characterized primarily by the use of traffic state data for conflict detection and resolution and a manual approach to meeting operational constraints. The strategic mode involved the combined use of traffic state and intent information, provided the pilot an additional level of alerting, and allowed an automated approach to meeting operational constraints. Operational constraints applied in the experiment included separation assurance, schedule adherence, airspace hazard avoidance, flight efficiency, and passenger comfort. The strategic operational mode was found to be effective in reducing unnecessary maneuvering in conflict situations where the intruder's intended maneuvers would resolve the conflict. Conditions of high operational complexity and vertical maneuvering resulted in increased proliferation of conflicts, but both operational modes exhibited characteristics of stability based on observed conflict proliferation rates of less than 30 percent. Scenario case studies illustrated the need for maneuver flight restrictions to prevent the creation of new conflicts through maneuvering and the need for an improved user interface design that appropriately focuses the pilot's attention on conflict prevention information. Pilot real-time assessment of maximum workload indicated minimal sensitivity to operational complexity, providing further evidence that pilot workload is not the limiting factor for feasibility of an en-route distributed

  18. A New Determination of Io's Heat Flow Using Diurnal Heat Balance Constraints

    Science.gov (United States)

    Spencer, J. R.; Rathbun, J. A.; McEwen, A. S.; Pearl, J. C.; Bastos, A.; Andrade, J.; Correia, M.; Barros, S.

    2002-01-01

    We use heat balance arguments to obtain a new estimate of Io's heat flow that does not depend on assumptions about the temperatures of its thermal anomalies. Our estimated heat flow is somewhat less than 2.2 +/- 0.9 W/sq m. Additional information is contained in the original extended abstract.

  19. Galileo SSI and Cassini ISS Observations of Io's Pele Hotspot: Temperatures, Areas, and Variation with Time

    Science.gov (United States)

    Radebaugh, J.; McEwen, A. S.; Milazzo, M.; Davies, A. G.; Keszthelyi, L. P.; Geissler, P.

    2002-01-01

    Temperatures of Io's Pele hotspot were found using dual-filter observations from Galileo and Cassini. Temperatures average 1375 K, but vary widely over tens of minutes. Dropoff in emission with rotation consistent with lava fountaining at a lava lake. Additional information is contained in the original extended abstract.

  20. Galileo SSI and Cassini ISS Observations of Io's Pele Hotspot: Temperatures, Areas, and Variation with Time

    Science.gov (United States)

    Radebaugh, J.; McEwen, A. S.; Milazzo, M.; Davies, A. G.; Keszthelyi, L. P.; Geissler, P.

    2002-01-01

    Temperatures of Io's Pele hotspot were found using dual-filter observations from Galileo and Cassini. Temperatures average 1375 K, but vary widely over tens of minutes. Dropoff in emission with rotation consistent with lava fountaining at a lava lake. Additional information is contained in the original extended abstract.

  1. Process frame instances for integrating strategic, tactical and operational information management in hospitals.

    Science.gov (United States)

    Issler, Lutz; Funkat, Gert; Smers, Stefan; Winter, Alfred

    2006-01-01

    An approach to reduce the complexity of information management is to distinguish it into strategic, tactical and operational management with each of the levels using its own software tools. In practice, the management levels are tightly connected and interact closely. The most evident information that has to be interchanged between the management levels is the information about finished, cancelled, running and planned activities or projects, respectively. We claim that the levels of information management should share information about the work done, and propose their integration by means of a network of so-called process frame instances. Process frame instances hold information about the activities of different information management levels in a structured and reusable way.

  2. OpenCV-Based Nanomanipulation Information Extraction and the Probe Operation in SEM

    Directory of Open Access Journals (Sweden)

    Dongjie Li

    2015-02-01

    Full Text Available Aimed at the established telenanomanipulation system, the method of extracting location information and the strategies of probe operation were studied in this paper. First, the machine learning algorithm of OpenCV was used to extract location information from SEM images. Thus nanowires and probe in SEM images can be automatically tracked and the region of interest (ROI can be marked quickly. Then the location of nanowire and probe can be extracted from the ROI. To study the probe operation strategy, the Van der Waals force between probe and a nanowire was computed; thus relevant operating parameters can be obtained. With these operating parameters, the nanowire in 3D virtual environment can be preoperated and an optimal path of the probe can be obtained. The actual probe runs automatically under the telenanomanipulation system's control. Finally, experiments were carried out to verify the above methods, and results show the designed methods have achieved the expected effect.

  3. Extracting important information from Chinese Operation Notes with natural language processing methods.

    Science.gov (United States)

    Wang, Hui; Zhang, Weide; Zeng, Qiang; Li, Zuofeng; Feng, Kaiyan; Liu, Lei

    2014-04-01

    Extracting information from unstructured clinical narratives is valuable for many clinical applications. Although natural Language Processing (NLP) methods have been profoundly studied in electronic medical records (EMR), few studies have explored NLP in extracting information from Chinese clinical narratives. In this study, we report the development and evaluation of extracting tumor-related information from operation notes of hepatic carcinomas which were written in Chinese. Using 86 operation notes manually annotated by physicians as the training set, we explored both rule-based and supervised machine-learning approaches. Evaluating on unseen 29 operation notes, our best approach yielded 69.6% in precision, 58.3% in recall and 63.5% F-score. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Galileo observations of volcanic plumes on Io

    Science.gov (United States)

    Geissler, P.E.; McMillan, M.T.

    2008-01-01

    Io's volcanic plumes erupt in a dazzling variety of sizes, shapes, colors and opacities. In general, the plumes fall into two classes, representing distinct source gas temperatures. Most of the Galileo imaging observations were of the smaller, more numerous Prometheus-type plumes that are produced when hot flows of silicate lava impinge on volatile surface ices of SO2. Few detections were made of the giant, Pele-type plumes that vent high temperature, sulfur-rich gases from the interior of Io; this was partly because of the insensitivity of Galileo's camera to ultraviolet wavelengths. Both gas and dust spout from plumes of each class. Favorably located gas plumes were detected during eclipse, when Io was in Jupiter's shadow. Dense dust columns were imaged in daylight above several Prometheus-type eruptions, reaching heights typically less than 100 km. Comparisons between eclipse observations, sunlit images, and the record of surface changes show that these optically thick dust columns are much smaller in stature than the corresponding gas plumes but are adequate to produce the observed surface deposits. Mie scattering calculations suggest that these conspicuous dust plumes are made up of coarse grained “ash” particles with radii on the order of 100 nm, and total masses on the order of 106 kg per plume. Long exposure images of Thor in sunlight show a faint outer envelope apparently populated by particles small enough to be carried along with the gas flow, perhaps formed by condensation of sulfurous “snowflakes” as suggested by the plasma instrumentation aboard Galileo as it flew through Thor's plume [Frank, L.A., Paterson, W.R., 2002. J. Geophys. Res. (Space Phys.) 107, doi:10.1029/2002JA009240. 31-1]. If so, the total mass of these fine, nearly invisible particles may be comparable to the mass of the gas, and could account for much of Io's rapid resurfacing.

  5. Cloud IoT Based Greenhouse Monitoring System

    Directory of Open Access Journals (Sweden)

    Keerthi.v

    2015-10-01

    Full Text Available This project explains the design and implementation of an electronic system based on GSM (Global System for Mobile communication, cloud computing and Internet of Things (IoT for sensing the climatic parameters in the greenhouse. Based on the characteristics of accurate perception, efficient transmission and intelligent synthesis of Internet of Things and cloud computing, the system can obtain real-time environmental information for crop growth and then be transmitted. The system can monitor a variety of environmental parameters in greenhouse effectively and meet the actual agricultural production requirements. Devices such as temperature sensor, light sensor, relative humidity sensor and soil moisture sensor are integrated to demonstrate the proposed system. This research focuses on developing a system that can automatically measure and monitor changes of temperature, light, Humidity and moisture level in the greenhouse. The quantity and quality of production in greenhouses can be increased. The procedure used in our system provides the owner with the details online irrespective of their presence onsite. The main system collects environmental parameters inside greenhouse tunnel every 30 seconds. The parameters that are collected by a network of sensors are being logged and stored online using cloud computing and Internet of Things (IoT together called as Cloud Iot.

  6. Io Plasma Torus Ion Composition: Voyager, Galileo, Cassini

    Science.gov (United States)

    Bagenal, Fran; Nerney, Edward; Steffl, Andrew Joseph

    2016-10-01

    With JAXA's Hisaki spacecraft in orbit around Earth gathering information on the Io plasma torus and NASA's Juno mission measuring plasma conditions in the jovian magnetosphere, the time is ripe for a re-evaluation of earlier observations of the plasma torus to assess evidence for temporal variations. In particular, we are interested in exploring the ion composition of the torus and whether there is evidence of the ultimate source – the volcanic gases from Io – have deviated from SO2. We use the latest CHIANTI 8.0 atomic database to analyze UV spectra of the torus from Voyager, Galileo and Cassini as well as with the physical chemistry model of Delamere, Steffl and Bagenal (2005). We find that contrary to earlier analyses of Voyager data (e.g. Shemansky 1987; 1988) that produced a composition requiring a neutral source of O/S~4, we find an ion composition that is consistent with the Cassini UVIS data (Steffl et al. 2004) and a neutral O/S~2, consistent with SO2.

  7. Technology strategy for integrated operations and real time reservoir management; Technology Target Areas; TTA5 - Integrated operations and RTRM

    Energy Technology Data Exchange (ETDEWEB)

    2007-07-01

    particularly for Arctic regions; Consequences of IO on HSE, including IT security and vulnerability. The introduction of IO on the NCS is enabling diverse parts of an organisation and its service providers to communicate and collaborate on a whole new level. The physical boundaries of distance and geography are virtually eliminated, with the almost instant availability of data and information wherever one is located. IO and RTRM will provide a significant opportunity for increased production, improved operating efficiency and reserves growth. However, the NCS operators need to understand the consequences of introducing IO on a large scale in order to sustain safe and efficient production Therefore it is vital that HSE consequences are addressed, particularly risks and consequences of the new work processes, and the reliance and hence vulnerability of remotely operated equipment. Emergency procedures, emergency preparedness, installation and information system security are other areas of concern. The Service providers are challenged to share data and communicate across open standard communication interfaces. In this way key business solutions, or even the competitive edge of individual service providers, are shared across a virtual collaborating group of companies. This means that a move from the current conventional supplier-operator relationship, to a gain and risk sharing business relationship is becoming a key component of IO. The industry needs closer links with Universities with regards to student IO education, retraining and building practical experience when it comes to IO and RTRM in the form of internships and summer jobs. It is important to communicate to students and the general public that there will be jobs in the Norwegian oil industry for many years still. The Reservoir management today operates over a period of months and years, however in the future, the rate and quality of data streaming to the reservoir management professional will increase many fold. High

  8. Simplified reactive power management strategy for complex power grids under stochastic operation and incomplete information

    DEFF Research Database (Denmark)

    Vlachogiannis, Ioannis (John)

    2009-01-01

    In the current released energy market, the large-scale complex transmission networks and the distribution ones with dispersed energy sources and "intelligent" components operate under uncertainties, stochastic and prior incomplete information. A safe and reliable operation of such complex power...... consider more stochastic aspects such as variable grid's topology. Results of the proposed strategy obtained on the networks of IEEE 30-bus and IEEE 118-bus systems demonstrate the effectiveness of the proposed strategy....

  9. SSTL I/O Standard based environment friendly energyl efficient ROM design on FPGA

    DEFF Research Database (Denmark)

    Bansal, Neha; Bansal, Meenakshi; Saini, Rishita

    2014-01-01

    In this work, we are making energy efficient 32-bit ALU by using different classes of LVCMOS IO standard. Here, we are operating our design with operating speed of 4th generation i7 processor in order to test the compatibility of our design with the latest state of the art technology based proces......, LVCMOS15, LVCMOS 18 at 2.9GHz respectively. In this we used, VERILOG hardware description language, XILINX ISE simulator, and Virtex-6 FPGA and XPower analyzer....

  10. Lorentz covariant reduced-density-operator theory for relativistic quantum information processing

    CERN Document Server

    Ahn, D; Hwang, S W; Ahn, Doyeol; Lee, Hyuk-jae; Hwang, Sung Woo

    2003-01-01

    In this paper, we derived Lorentz covariant quantum Liouville equation for the density operator which describes the relativistic quantum information processing from Tomonaga-Schwinger equation and an exact formal solution for the reduced-density-operator is obtained using the projector operator technique and the functional calculus. When all the members of the family of the hypersurfaces become flat hyperplanes, it is shown that our results agree with those of non-relativistic case which is valid only in some specified reference frame. The formulation presented in this work is general and might be applied to related fields such as quantum electrodynamics and relativistic statistical mechanics.

  11. On the Value of Structural Health Monitoring Information for the Operation of Wind Parks

    DEFF Research Database (Denmark)

    Thöns, Sebastian; Faber, Michael H.; Val, Dimitri V.

    2017-01-01

    In the present paper, an approach for the quantification of the Value of Structural Health Monitoring (SHM) Information building upon a framework for infrastructure system utility and decision analysis is developed and applied to the operation of wind parks. The quantification of the value of SHM...... facilitates a benefit and risk informed assessment and optimization of SHM strategies and encompasses models for the infrastructure functionality, the structural constituent and system risks and its management as well as the performance of SHM strategies. A wind park system model incorporating the structural...... for the propagation of SHM information and uncertainties from components to the different system levels and vice versa. The decision to extend the service life and the operation of a wind park is investigated without SHM information and by quantifying the value of several SHM strategies....

  12. Design of Small Storage Management System Based on IOS Platform%基于IOS平台的小型仓储管理系统设计

    Institute of Scientific and Technical Information of China (English)

    乔木; 龚俊儒; 沈杏林; 杨虎

    2014-01-01

    Along with the rapid development of digitization and information technology application in the field of logistics , many kinds of storage management systems are paid more and more attention .The small storage management system based on IOS plat-form utilizes IOS devices to collect cargo information to satisfy the customers ’ requirements for the convenience and efficiency of the storage management , through an operation system which is constructed by SQLite database technology and ZXing barcode im -age processing library, can better meet the needs of data interaction of small scale of customers .At the same time, the system is of low cost and convenient operation etc .%随着数字化、信息化技术在物流领域应用的飞速发展,各种各样的仓储管理系统日益受到关注。本文介绍的基于IOS平台的小型仓储管理系统是利用IOS设备对货物信息进行采集,通过SQLite数据库技术、ZXing库等软硬件方式构建的业务系统,可以较好地适应中小规模用户数据交互的需求。同时,系统具备造价低廉、操作便捷等优点。

  13. Development of Information System for Patients with Cleft Lip and Palate undergoing Operation.

    Science.gov (United States)

    Augsornwan, Darawan; Pattangtanang, Pantamanas; Surakunprapha, Palakorn

    2015-08-01

    Srinagarind Hospital has 150-200 patients with cleft lip and palate each year. When patients are admitted to hospital for surgery patients and family feel they are in a crisis of life, they feel fear anxiety and need to know about how to take care of wound, they worry if patient will feel pain, how to feed patients and many things about patients. Information is very important for patients/family to prevent complications and help their decision process, decrease parents stress and encourage better co-operation. To develop information system for patients with cleft lip-palate undergoing operation. This is an action research divided into 3 phases. Phase 1 Situation review: in this phase we interview, nursing care observation, and review nursing documents about the information giving. Phase 2 Develop information system: focus groups, for discussion about what nurses can do to develop the system to give information to patients/parents. Phase 3 evaluation: by interviewing 61 parents using the structure questionnaire. 100 percent of patients/parents received information but some items were not received. Patients/parents satisfaction was 94.9 percent, no complications. The information system development provides optimal care for patients and family with cleft lip and palate, but needs to improve some techniques or tools to give more information and evaluate further the nursing outcome after.

  14. The variation of Io's auroral footprint brightness with the location of Io in the plasma torus

    Science.gov (United States)

    Serio, Andrew W.; Clarke, John T.

    2008-09-01

    Ultraviolet and near-infrared observations of auroral emissions from the footprint of Io's magnetic Flux Tube (IFT) mapping to Jupiter's ionosphere have been interpreted via a combination of the unipolar inductor model [Goldreich, P., Lynden-Bell, D., 1969. Astrophys. J. 156, 59-78] and the multiply-reflected Alfvén wave model [ Belcher, J.W., 1987. Science 238, 170-176]. While both models successfully explain the general nature of the auroral footprint and corotational wake, and both predict the presence of multiple footprints, the details of the interaction near Io are complicated [ Saur, J., Neubauer, F.M., Connerney, J.E.P., Zarka, P., Kivelson, M.G., 2004. In: Bagenal, F., Dowling, T.E., McKinnon, W.B. (Eds.), Jupiter: The Planet, Satellites and Magnetosphere. Cambridge University Press, Cambridge, UK, pp. 537-560; Kivelson, M.G., Bagenal, F., Kurth, W.S., Neubauer, F.M., Paranicas, C., Saur, J., 2004. In: Bagenal, F., Dowling, T.E., McKinnon, W.B. (Eds.), Jupiter: The Planet, Satellites and Magnetosphere. Cambridge University Press, Cambridge, UK, pp. 513-536]. The auroral footprint brightness is believed to be a good remote indicator of the strength of the interaction near Io, indicating the energy and current strength linking Io with Jupiter's ionosphere. The brightness may also depend in part on local auroral acceleration processes near Jupiter. The relative importance of different physical processes in this interaction can be tested as Jupiter's rotation and Io's orbital motion shift Jupiter's magnetic centrifugal equator past Io, leading to longitudinal variations in the plasma density near Io and functionally different variations in the local field strength near Jupiter where the auroral emissions are produced. Initial HST WFPC2 observations found a high degree of variability in the footprint brightness with time, and some evidence for systematic variations with longitude [Clarke, J.T., Ben Jaffel, L., Gérard, J.-C., 1998. J. Geophys. Res. 103, 20217

  15. Penerapan Action RPG pada Perangkat Mobile Berbasiskan iOS

    Directory of Open Access Journals (Sweden)

    Budi Yulianto

    2011-12-01

    Full Text Available Mobile games develop along with technological developments. Gaming applications by applying special graphics technologies optimizes any mobile device. The purpose of this study is to design an Action RPG game application by applying Cocos2d technology to be implemented on mobile devices based on IOS operating system. This study performs data collecting and analyzing, interface designing, application implementation, and application evaluation using the Waterfall Model. Data collection is withdrawn from several surveys related to user needs and similar games. Progressing the study, gameplay design is performed using UML, the data storage structure, and interface design. The study results in an Action RPG game application that is implemented on mobile devices. The results showes that Action RPG games can be developed by incorporating elements of art, graphics, and stories that enhance user's interests. 

  16. Io's volcanic influence on the Io plasma torus: HISAKI observation in 2015

    Science.gov (United States)

    Tsuchiya, F.; Yoshioka, K.; Kimura, T.; Murakami, G.; Yoneda, M.; Koga, R.; Kagitani, M.; Sakanoi, T.; Kasaba, Y.; Yamazaki, A.; Yoshikawa, I.

    2015-12-01

    The satellite Io which has many active volcanos supplies volcanic gases to the Jovian magnetosphere with typical rate of 1 ton/sec and has been known be a primary source of plasmas in the magnetosphere. Change in the volcanic activity on Io should cause change of the supply rate and could affect structure of the magnetosphere and dynamics occurs in it. However, responses of the magnetosphere to the volcanic activity is still not fully understood; one of the reasons is lack of continuous and long term observations of Io' volcanic gas extended around Io, plasmas in the Io torus, and activity of the magnetosphere. The extreme ultraviolet (EUV) spectroscope, EXCEED, onboard the HISAKI satellite has capability to measure ion and atomic emission lines in EUV range (55-145nm) and is dedicated to observing solar system planets. The satellite has been successfully launched on Sep. 2013 and 2nd campaign of Io plasma torus and Jovian northern EUV aurora observation has been done from the end of Nov. 2014 to middle of May 2015. On middle of Jan. 2015, HISAKI detected gradual increase in intensity of S+ emission lines and decrease of S3+ ones in the plasma torus. The S+ intensity showed a maximum around the end of Feb. and S++ and S3+ intensities also showed maxima subsequently. Simultaneous ground based observation of the sodium nebula showed increase of the emission intensity from the middle of Jan. to the beginning of Mar. These observations suggest that the volcanic activity began at the middle of Jan. and increase neutral atom and ion densities in the Io torus. The intensities of S+ and S2+ ions returned to the pre-increase level by the middle of May 2015. S3+ had still been in the decay phase at the end of the observation. Change in radial structure of the plasma torus was also found during the volcanic event. The intensity of S+ ion began to increase around the orbit of Io (6 Jovian radii). The brightened region propagated outward and reached at 8.5 Jovian radii from

  17. 78 FR 68079 - Information Collection Activities: Oil and Gas Well-Completion Operations; Submitted for Office...

    Science.gov (United States)

    2013-11-13

    ... INFORMATION: Title: 30 CFR 250, Subpart E, Oil and Gas Well-Completion Operations. OMB Control Number: 1014... driller's report. 517(d)(8) Function test ROV 10 17 wells 170 interventions on your subsea BOP stack... completions..... 13 autoshear and deadman on your subsea BOP stack during stump test; document all...

  18. Contriving Motivating Operations to Evoke Mands for Information in Preschoolers with Autism

    Science.gov (United States)

    Endicott, Katie; Higbee, Thomas S.

    2007-01-01

    Four preschoolers with autism participated in the study. Stimulus preference assessments were conducted to identify high and low preferred items, which were then hidden or given to an adult in order to contrive motivation for the information about the location of the items. The first experiment involved the manipulation of motivating operations to…

  19. Contriving Motivating Operations to Evoke Mands for Information in Preschoolers with Autism

    Science.gov (United States)

    Endicott, Katie; Higbee, Thomas S.

    2007-01-01

    Four preschoolers with autism participated in the study. Stimulus preference assessments were conducted to identify high and low preferred items, which were then hidden or given to an adult in order to contrive motivation for the information about the location of the items. The first experiment involved the manipulation of motivating operations to…

  20. A mapping study on cooperation between information system development and operations

    NARCIS (Netherlands)

    Erich, Floris; Amrit, Chintan; Daneva, Maya; Jedlitschka, Andreas; Kuvaja, Pasi; Kuhrmann, Marco; Männistö, Tomi; Münch, Jürgen; Raatikainen, Mikko

    2014-01-01

    DevOps is a conceptual framework for reintegrating development and operations of Information Systems.We performed a Systematic Mapping Study to explore DevOps. 26 articles out of 139 were selected, studied and summarized. Based on this a concept table was constructed. We discovered that DevOps has n

  1. 75 FR 38595 - Guidance to States Regarding Driver History Record Information Security, Continuity of Operation...

    Science.gov (United States)

    2010-07-02

    ...The Federal Motor Carrier Safety Administration (FMCSA) announces guidance to State driver licensing agencies (SDLAs) to support their efforts at maintaining the security of information contained in the driver history record of commercial driver's license (CDL) holders. Further, FMCSA provides States with recommendations related to continuity of operation and disaster recovery planning to......

  2. A Mapping Study on Cooperation between Information System Development and Operations

    NARCIS (Netherlands)

    Erich, Floris; Amrit, Chintan Amrit; Daneva, Maia; Jedlitschka, Andreas; Kuvaja, Pasi; Kuhrmann, Marco; Männistö, Tomi; Münch, Jürgen; Raatikainen, Mikko

    2014-01-01

    DevOps is a conceptual framework for reintegrating development and operations of Information Systems.We performed a Systematic Mapping Study to explore DevOps. 26 articles out of 139 were selected, studied and summarized. Based on this a concept table was constructed. We discovered that DevOps has

  3. Using accounting information systems by operations managers in a project company

    NARCIS (Netherlands)

    Veeken, van der Henk J.M.; Wouters, Marc J.F.

    2002-01-01

    This paper describes the results of a case study that investigated the use of accounting information by operations managers in a road building company. There was considerable preplanning before the execution of project activities, but task uncertainty during execution created the need to take correc

  4. Using accounting information systems by operations managers in a project company

    NARCIS (Netherlands)

    Wouters, Marc; van der Veeken, Henk J.M.

    2002-01-01

    This paper describes the results of a case study that investigated the use of accounting information by operations managers in a road building company. There was considerable preplanning before the execution of project activities, but task uncertainty during execution created the need to take

  5. The Relationship between Chief Information Officer Transformational Leadership and Computing Platform Operating Systems

    Science.gov (United States)

    Anderson, George W.

    2010-01-01

    The purpose of this study was to relate the strength of Chief Information Officer (CIO) transformational leadership behaviors to 1 of 5 computing platform operating systems (OSs) that may be selected for a firm's Enterprise Resource Planning (ERP) business system. Research shows executive leader behaviors may promote innovation through the use of…

  6. The Relationship between Chief Information Officer Transformational Leadership and Computing Platform Operating Systems

    Science.gov (United States)

    Anderson, George W.

    2010-01-01

    The purpose of this study was to relate the strength of Chief Information Officer (CIO) transformational leadership behaviors to 1 of 5 computing platform operating systems (OSs) that may be selected for a firm's Enterprise Resource Planning (ERP) business system. Research shows executive leader behaviors may promote innovation through the use of…

  7. Method of Choosing the Information Technology System Supporting Management of the Military Aircraft Operation

    Directory of Open Access Journals (Sweden)

    Barszcz Piotr

    2014-12-01

    Full Text Available The paper presents a method of choosing the information technology system, the task of which is to support the management process of the military aircraft operation. The proposed method is based on surveys conducted among direct users of IT systems used in aviation of the Polish Armed Forces. The analysis of results of the surveys was conducted using statistical methods. The paper was completed with practical conclusions related to further usefulness of the individual information technology systems. In the future, they can be extremely useful in the process of selecting the best solutions and integration of the information technology systems

  8. New thallium iodates—Synthesis, characterization, and calculations of Tl(IO 3) 3 and Tl 4(IO 3) 6, [Tl +3Tl 3+(IO 3) 6

    Science.gov (United States)

    Yeon, Jeongho; Kim, Sang-Hwan; Halasyamani, P. Shiv

    2009-12-01

    Two new thallium iodates have been synthesized, Tl(IO 3) 3 and Tl 4(IO 3) 6 [Tl +3Tl 3+(IO 3) 6], and characterized by single-crystal X-ray diffraction. Both materials were synthesized as phase-pure compounds through hydrothermal techniques using Tl 2CO 3 and HIO 3 as reagents. The materials crystallize in space groups R-3 (Tl(IO 3) 3) and P-1 (Tl 4(IO 3) 6). Although lone-pairs are observed for both I 5+ and Tl +, electronic structure calculations indicate the lone-pair on I 5+ is stereo-active, whereas the lone-pair on Tl + is inert.

  9. Novel, Web-based, information-exploration approach for improving operating room logistics and system processes.

    Science.gov (United States)

    Nagy, Paul G; Konewko, Ramon; Warnock, Max; Bernstein, Wendy; Seagull, Jacob; Xiao, Yan; George, Ivan; Park, Adrian

    2008-03-01

    Routine clinical information systems now have the ability to gather large amounts of data that surgical managers can access to create a seamless and proactive approach to streamlining operations and minimizing delays. The challenge lies in aggregating and displaying these data in an easily accessible format that provides useful, timely information on current operations. A Web-based, graphical dashboard is described in this study, which can be used to interpret clinical operational data, allow managers to see trends in data, and help identify inefficiencies that were not apparent with more traditional, paper-based approaches. The dashboard provides a visual decision support tool that assists managers in pinpointing areas for continuous quality improvement. The limitations of paper-based techniques, the development of the automated display system, and key performance indicators in analyzing aggregate delays, time, specialties, and teamwork are reviewed. Strengths, weaknesses, opportunities, and threats associated with implementing such a program in the perioperative environment are summarized.

  10. LTE和物联网融合%The Mergence of LTE & IoT

    Institute of Scientific and Technical Information of China (English)

    李铁峰; 黄耀军; 张震

    2013-01-01

      物联网被誉为是推动产业升级迈向信息社会的发动机。具有物联网特征的相关应用层出不穷。LTE和物联网是两个方兴未艾的技术,在技术和市场的推动下,二者融合得将更加紧密,LTE(Long Term Evolution)和物联网(Internet of Things)是当今炙手可热的两个话题。简要介绍了物联网和LTE技术,阐述了物联网技术中机器类型通信(MTC)的概念、架构和技术,详细说明了LTE网络在物联网中的地位、与MTC的融合应用,描绘了LTE网络在物联网应用中的美好前景,同时指出了面临的问题和挑战。%IoT (Internet of Things) is regarded as the engine for promoting industry upgrade and strding forward towards the information society, and the relevant applications of IoT emerge in an endless stream. LTE (Long Term Evolution) and IoT are the two technologies in the ascendant, and with the promotion of technical development and market, these two technologies are even more closely emerged. Nowadays LTE and IoT are the two hottest topics. This article briefly describes the technologies of LTE and IoT, tells of the concept, architecture and technology of MTC (Machine Type Communication) in IoT, and treats of the position of LTE network in IoT and the merged applications with MTC. Meanwhile it points out the problems and challenges while expounding the bright future of LTE network in the applications of IoT.

  11. Improving multi-objective reservoir operation optimization with sensitivity-informed problem decomposition

    Science.gov (United States)

    Chu, J. G.; Zhang, C.; Fu, G. T.; Li, Y.; Zhou, H. C.

    2015-04-01

    This study investigates the effectiveness of a sensitivity-informed method for multi-objective operation of reservoir systems, which uses global sensitivity analysis as a screening tool to reduce the computational demands. Sobol's method is used to screen insensitive decision variables and guide the formulation of the optimization problems with a significantly reduced number of decision variables. This sensitivity-informed problem decomposition dramatically reduces the computational demands required for attaining high quality approximations of optimal tradeoff relationships between conflicting design objectives. The search results obtained from the reduced complexity multi-objective reservoir operation problems are then used to pre-condition the full search of the original optimization problem. In two case studies, the Dahuofang reservoir and the inter-basin multi-reservoir system in Liaoning province, China, sensitivity analysis results show that reservoir performance is strongly controlled by a small proportion of decision variables. Sensitivity-informed problem decomposition and pre-conditioning are evaluated in their ability to improve the efficiency and effectiveness of multi-objective evolutionary optimization. Overall, this study illustrates the efficiency and effectiveness of the sensitivity-informed method and the use of global sensitivity analysis to inform problem decomposition when solving the complex multi-objective reservoir operation problems.

  12. Improving multi-objective reservoir operation optimization with sensitivity-informed dimension reduction

    Science.gov (United States)

    Chu, J.; Zhang, C.; Fu, G.; Li, Y.; Zhou, H.

    2015-08-01

    This study investigates the effectiveness of a sensitivity-informed method for multi-objective operation of reservoir systems, which uses global sensitivity analysis as a screening tool to reduce computational demands. Sobol's method is used to screen insensitive decision variables and guide the formulation of the optimization problems with a significantly reduced number of decision variables. This sensitivity-informed method dramatically reduces the computational demands required for attaining high-quality approximations of optimal trade-off relationships between conflicting design objectives. The search results obtained from the reduced complexity multi-objective reservoir operation problems are then used to pre-condition the full search of the original optimization problem. In two case studies, the Dahuofang reservoir and the inter-basin multi-reservoir system in Liaoning province, China, sensitivity analysis results show that reservoir performance is strongly controlled by a small proportion of decision variables. Sensitivity-informed dimension reduction and pre-conditioning are evaluated in their ability to improve the efficiency and effectiveness of multi-objective evolutionary optimization. Overall, this study illustrates the efficiency and effectiveness of the sensitivity-informed method and the use of global sensitivity analysis to inform dimension reduction of optimization problems when solving complex multi-objective reservoir operation problems.

  13. Plan for the design, development, and implementation, and operation of the National Water Information System

    Science.gov (United States)

    Edwards, M.D.

    1987-01-01

    The Water Resources Division of the U.S. Geological Survey is developing a National Water Information System (NWIS) that will integrate and replace its existing water data and information systems of the National Water Data Storage and Retrieval System, National Water Data Exchange, National Water-Use Information, and Water Resources Scientific Information Center programs. It will be a distributed data system operated as part of the Division 's Distributed Information System, which is a network of computers linked together through a national telecommunication network known as GEONET. The NWIS is being developed as a series of prototypes that will be integrated as they are completed to allow the development and implementation of the system in a phased manner. It also is being developed in a distributed manner using personnel who work under the coordination of a central NWIS Project Office. Work on the development of the NWIS began in 1983 and it is scheduled for completion in 1990. This document presents an overall plan for the design, development, implementation, and operation of the system. Detailed discussions are presented on each of these phases of the NWIS life cycle. The planning, quality assurance, and configuration management phases of the life cycle also are discussed. The plan is intended to be a working document for use by NWIS management and participants in its design and development and to assist offices of the Division in planning and preparing for installation and operation of the system. (Author 's abstract)

  14. POLAR ICE: Integrating, Distributing and Visualising Ice Information Products for Operators in Polar Waters

    Science.gov (United States)

    Walker, Nick; Fleming, Andrew; Cziferszky, Andreas; Toudal Pedersen, Leif; Rasmussen, Till; Makynen, Marko; Berglund, Robin; Seitsonen, Lauri; Rudjord, Oystein; Solberg, Rune; Tangen, Helge; Axell, Lars; Saldo, Roberto; Melsheimer, Christian; Larsen, Hans Eilif; Puestow, Thomas; Arhturs, David; Flach, Dominie

    2016-08-01

    The POLAR ICE project has developed a system for integrating and delivering satellite derived ice information products to operators working in the economically and environmentally important Arctic and Antarctic regions. POLAR ICE has been supported by the European Commission's FP7 programme and undertaken by European and Canadian companies and institutes, who are all partners in the Polar View Earth Observation Limited (PVEO) company. It is the aim of PVEO to commercialise the service that has been developed and demonstrated as a part of POLAR ICE.Access to sea ice information derived from satellite earth observation data is critical to support the increasing numbers of Arctic and Antarctic shipping and off-shore operations and to protect the rapidly changing polar environment.To-date the development of sea ice information capabilities has addressed separate elements of complete service chains. In contrast POLAR ICE has linked these separate elements together, filled in known gaps and built a robust integrated service chain.

  15. [Design of an anesthesia and micro-environment information management system in mobile operating room].

    Science.gov (United States)

    Wang, Xianwen; Liu, Zhiguo; Zhang, Wenchang; Wu, Qingfu; Tan, Shulin

    2013-08-01

    We have designed a mobile operating room information management system. The system is composed of a client and a server. A client, consisting of a PC, medical equipments, PLC and sensors, provides the acquisition and processing of anesthesia and micro-environment data. A server is a powerful computer that stores the data of the system. The client gathers the medical device data by using the C/S mode, and analyzes the obtained HL7 messages through the class library call. The client collects the micro-environment information with PLC, and finishes the data reading with the OPC technology. Experiment results showed that the designed system could manage the patient anesthesia and micro-environment information well, and improve the efficiency of the doctors' works and the digital level of the mobile operating room.

  16. Antiviral Information Management System (AIMS): a prototype for operational innovation in drug development.

    Science.gov (United States)

    Jadhav, Pravin R; Neal, Lauren; Florian, Jeff; Chen, Ying; Naeger, Lisa; Robertson, Sarah; Soon, Guoxing; Birnkrant, Debra

    2010-09-01

    This article presents a prototype for an operational innovation in knowledge management (KM). These operational innovations are geared toward managing knowledge efficiently and accessing all available information by embracing advances in bioinformatics and allied fields. The specific components of the proposed KM system are (1) a database to archive hepatitis C virus (HCV) treatment data in a structured format and retrieve information in a query-capable manner and (2) an automated analysis tool to inform trial design elements for HCV drug development. The proposed framework is intended to benefit drug development by increasing efficiency of dose selection and improving the consistency of advice from US Food and Drug Administration (FDA). It is also hoped that the framework will encourage collaboration among FDA, industry, and academic scientists to guide the HCV drug development process using model-based quantitative analysis techniques.

  17. BIM and IoT: A Synopsis from GIS Perspective

    Science.gov (United States)

    Isikdag, U.

    2015-10-01

    Internet-of-Things (IoT) focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs) and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building "Models" and information acquired from the city objects i.e. "Things". Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  18. BIM and IoT: A Synopsis from GIS Perspective

    Directory of Open Access Journals (Sweden)

    U. Isikdag

    2015-10-01

    Full Text Available Internet-of-Things (IoT focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building “Models” and information acquired from the city objects i.e. “Things”. Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  19. Virtualization Framework for Energy Efficient IoT Networks

    OpenAIRE

    Al-Azez, ZTS; Lawey, AQ; El-Gorashi, TEH; Elmirghani, JMH

    2015-01-01

    In this paper, we introduce a Mixed Integer Linear Programming (MILP) model to design an energy efficient cloud computing platform for Internet of Things (IoT) networks. In our model, the IoT network consisted of four layers. The first (lowest) layer consisted of IoT devices, e.g. temperature sensors. The networking elements (relays, coordinators and gateways) are located within the upper three layers, respectively. These networking elements perform the tasks of data aggregation and processin...

  20. Xamarin mobile application development for iOS

    CERN Document Server

    Johnson, Paul F

    2013-01-01

    This book is a standard tutorial aimed at teaching you everything you need to know about iOS app development using Xamarin.This book is written for those who are new to iOS app development as well as more experienced developers who just need a quick reference book. It is assumed that you are already comfortable using C#. Those teaching iOS to new students will also find this book invaluable as a form of reference material.

  1. A Step Towards Checking Security in IoT

    Directory of Open Access Journals (Sweden)

    Chiara Bodei

    2016-08-01

    Full Text Available The Internet of Things (IoT is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  2. A systemic and cognitive approach for IoT security

    OpenAIRE

    Riahi, Arbia; Natalizio, Enrico; Challal, Yacine; Mitton, Nathalie; Iera, Antonio

    2014-01-01

    Invited Paper; International audience; The Internet of Things (IoT) will enable objects to become active participants of everyday activities. Introducing objects into the control processes of complex systems makes IoT security very difficult to address. Indeed, the Internet of Things is a complex paradigm in which people interact with the technological ecosystem based on smart objects through complex processes. The interactions of these four IoT components, person, intelligent object, technol...

  3. Application development with Parse using iOS SDK

    CERN Document Server

    Birani, Bhanu

    2013-01-01

    A practical guide, featuring step-by-step instructions showing you how to use Parse iOS, and handle your data on cloud.If you are a developer who wants to build your applications instantly using Parse iOS as a back end application development, this book is ideal for you. This book will help you to understand Parse, featuring examples to help you get familiar with the concepts of Parse iOS.

  4. Multiple Independent File Parallel I/O with HDF5

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M. C.

    2016-07-13

    The HDF5 library has supported the I/O requirements of HPC codes at Lawrence Livermore National Labs (LLNL) since the late 90’s. In particular, HDF5 used in the Multiple Independent File (MIF) parallel I/O paradigm has supported LLNL code’s scalable I/O requirements and has recently been gainfully used at scales as large as O(106) parallel tasks.

  5. Improving Water Resources System Operation by Direct Use of Hydroclimatic Information

    Science.gov (United States)

    Castelletti, A.; Pianosi, F.

    2011-12-01

    It is generally agreed that more information translates into better decisions. For instance, the availability of inflow predictions can improve reservoir operation; soil moisture data can be exploited to increase irrigation efficiency; etc. However, beyond this general statement, many theoretical and practical questions remain open. Provided that not all information sources are equally relevant, how does their value depend on the physical features of the water system and on the purposes of the system operation? What is the minimum lead time needed for anticipatory management to be effective? How does uncertainty in the information propagates through the modelling chain from hydroclimatic data through descriptive and decision models, and finally affect the decision? Is the data-predictions-decision paradigm truly effective or would it be better to directly use hydroclimatic data to take optimal decisions, skipping the intermediate step of hydrological forecasting? In this work we investigate these issues by application to the management of a complex water system in Northern Vietnam, characterized by multiple, conflicting objectives including hydropower production, flood control and water supply. First, we quantify the value of hydroclimatic information as the improvement in the system performances that could be attained under the (ideal) assumption of perfect knowledge of all future meteorological and hydrological input. Then, we assess and compare the relevance of different candidate information (meteorological or hydrological observations; ground or remote data; etc.) for the purpose of system operation by novel Input Variable Selection techniques. Finally, we evaluate the performance improvement made possible by the use of such information in re-designing the system operation.

  6. A comprehensive operating room information system using the Kinect sensors and RFID.

    Science.gov (United States)

    Nouei, Mahyar Taghizadeh; Kamyad, Ali Vahidian; Soroush, Ahmad Reza; Ghazalbash, Somayeh

    2015-04-01

    Occasionally, surgeons do need various types of information to be available rapidly, efficiently and safely during surgical procedures. Meanwhile, they need to free up hands throughout the surgery to necessarily access the mouse to control any application in the sterility mode. In addition, they are required to record audio as well as video files, and enter and save some data. This is an attempt to develop a comprehensive operating room information system called "Medinav" to tackle all mentioned issues. An integrated and comprehensive operating room information system is introduced to be compatible with Health Level 7 (HL7) and digital imaging and communications in medicine (DICOM). DICOM is a standard for handling, storing, printing, and transmitting information in medical imaging. Besides, a natural user interface (NUI) is designed specifically for operating rooms where touch-less interactions with finger and hand tracking are in use. Further, the system could both record procedural data automatically, and view acquired information from multiple perspectives graphically. A prototype system is tested in a live operating room environment at an Iranian teaching hospital. There are also contextual interviews and usability satisfaction questionnaires conducted with the "MediNav" system to investigate how useful the proposed system could be. The results reveal that integration of these systems into a complete solution is the key to not only stream up data and workflow but maximize surgical team usefulness as well. It is now possible to comprehensively collect and visualize medical information, and access a management tool with a touch-less NUI in a rather quick, practical, and harmless manner.

  7. 14 CFR 330.29 - What information must air taxi operators submit on Form 330 (Final) and Form 330-C?

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false What information must air taxi operators... COMPENSATION OF AIR CARRIERS Application Procedures § 330.29 What information must air taxi operators submit on Form 330 (Final) and Form 330-C? As an air taxi operator, you must complete Form 330 (Final) in...

  8. 78 FR 25783 - Notice of Request for Clearance of a New Information Collection: National Census of Ferry Operators

    Science.gov (United States)

    2013-05-02

    ... Collection: National Census of Ferry Operators AGENCY: Bureau of Transportation Statistics (BTS), Research...) approval for an information collection related to the Nation's ferry operations. The information collected will be used to produce a descriptive database of existing ferry operations. A summary report of survey...

  9. Design and Implementation of IoT Cloud Moveable SCADA Supported by GSM for Industrial Applications

    Directory of Open Access Journals (Sweden)

    Mahmoud Shaker Nasr

    2017-05-01

    Full Text Available The world at the beginning of a new era of innovation and development with the rise of the industrial Internet or Internet of Things, IoT. It takes the space through the convergence of the global industrial system with the power of advanced computing, analytics, and low cost sensor devices and innovation of communication allowed by the Internet. One of the most important developments is IoT SCADA systems, which are considered as infrastructure of society because of their potential enormous in several industrial applications. This paper presents the design of a new generation of SCADA, named moveable SCADA , based on IoT cloud, and supported by GSM for more flexibility and reliability. The system is applied to industrial application that consists of three-control processes which are temperature, liquid level and motor processes. The three control processes data acquisition and controllers are implemented using embedded microcontroller system while a gateway is used to transfer the data proceed in field supervisor at first as well as main supervisor and monitoring engineer through IoT cloud. The system supported by GSM unit to support the system in case of internet failure. Also a camera is added to the system in order to monitor any location, any location (determined by any of the authorities in the field where the camera is mounted. The proposed SCADA is implemented practically and tested for many cases; the presented obtained results demonstrate that the system operation is very fair and meet the required targets.

  10. Modeling IoT-based solutions using human-centric wireless sensor networks.

    Science.gov (United States)

    Monares, Álvaro; Ochoa, Sergio F; Santos, Rodrigo; Orozco, Javier; Meseguer, Roc

    2014-08-25

    The Internet of Things (IoT) has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  11. Modeling IoT-Based Solutions Using Human-Centric Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Álvaro Monares

    2014-08-01

    Full Text Available The Internet of Things (IoT has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  12. Rethinking key–value store for parallel I/O optimization

    Energy Technology Data Exchange (ETDEWEB)

    Kougkas, Antonios; Eslami, Hassan; Sun, Xian-He; Thakur, Rajeev; Gropp, William

    2017-07-01

    Key-value stores are being widely used as the storage system for large-scale internet services and cloud storage systems. However, they are rarely used in HPC systems, where parallel file systems are the dominant storage solution. In this study, we examine the architecture differences and performance characteristics of parallel file systems and key-value stores. We propose using key-value stores to optimize overall Input/Output (I/O) performance, especially for workloads that parallel file systems cannot handle well, such as the cases with intense data synchronization or heavy metadata operations. We conducted experiments with several synthetic benchmarks, an I/O benchmark, and a real application. We modeled the performance of these two systems using collected data from our experiments, and we provide a predictive method to identify which system offers better I/O performance given a specific workload. The results show that we can optimize the I/O performance in HPC systems by utilizing key-value stores.

  13. Interaction between users and IoT clusters

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2015-01-01

    The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together...... this will enable the vision of an "Internet of People, Things and Services" (IoPTS). Application areas for IoT include smart cities, smart homes, environmental control, security & emergency, retail, logistics, industrial control, smart farming, and e-Health. All the IoT objects are organized in clusters, which...

  14. IoT interoperability:a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  15. IoT interoperability:a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  16. Strong tidal dissipation in Io and Jupiter from astrometric observations.

    Science.gov (United States)

    Lainey, Valéry; Arlot, Jean-Eudes; Karatekin, Ozgür; Van Hoolst, Tim

    2009-06-18

    Io is the volcanically most active body in the Solar System and has a large surface heat flux. The geological activity is thought to be the result of tides raised by Jupiter, but it is not known whether the current tidal heat production is sufficiently high to generate the observed surface heat flow. Io's tidal heat comes from the orbital energy of the Io-Jupiter system (resulting in orbital acceleration), whereas dissipation of energy in Jupiter causes Io's orbital motion to decelerate. Here we report a determination of the tidal dissipation in Io and Jupiter through its effect on the orbital motions of the Galilean moons. Our results show that the rate of internal energy dissipation in Io (k(2)/Q = 0.015 +/- 0.003, where k(2) is the Love number and Q is the quality factor) is in good agreement with the observed surface heat flow, and suggest that Io is close to thermal equilibrium. Dissipation in Jupiter (k(2)/Q = (1.102 +/- 0.203) x 10(-5)) is close to the upper bound of its average value expected from the long-term evolution of the system, and dissipation in extrasolar planets may be higher than presently assumed. The measured secular accelerations indicate that Io is evolving inwards, towards Jupiter, and that the three innermost Galilean moons (Io, Europa and Ganymede) are evolving out of the exact Laplace resonance.

  17. The IoT Spartans Challenge

    OpenAIRE

    Libelium

    2016-01-01

    La Universidad Politécnica de Cartagena (UPCT) ha destacado en la primera edición de la competición internacional IoT Spartans Challenge, organizada por Libelium. Catorce de sus estudiantes se han quedado entre los cien primeros clasificados de entre los 1.200 participantes de una decena de universidades y uno de ellos, el alumno de Ingeniería Telemática Sergio López, ha sido el tercer mejor desarrollador, logrando un premio de 500 euros y licencias gratuitas de Microsoft. La competición es a...

  18. A (IoT) chairy tale

    OpenAIRE

    Ligos Masafrets, Marc

    2014-01-01

    “A (IoT) Chairy Tale” es un proyecto de investigación teóricopráctico que, mediante el uso del Diseño de Ficción y la construcción de un prototipo diegético, trabaja sobre las dificultades éticas que plantea la penetración de una tecnología como el Internet de las Cosas y los cambios sociales y políticos que puede conllevar para que su implantación sea posible.

  19. Flujo de control en iOS Flow control in iOS

    Directory of Open Access Journals (Sweden)

    Franklin Hernández Castro

    2012-11-01

    Full Text Available El objetivo de este artículo es explicar los flujos de control que se usan en la programación de las aplicaciones en iOS, con el fin de resumir los aspectos más relevantes que se deben tomar en cuenta para programar una tarea a ser realizada por un dispositivo móvil del tipo iPhone o iPad. Debido a que el ambiente iOS es estrictamente orientado a objetos (OOP, los flujos de control no son obvios; además, los estándares de la firma Apple® definen patrones de diseño en el sistema que son altamente recomendados en este tipo de diseño. En este artículo se introducen algunos de ellos.This paper explain the control flows that are used by programming applications in iOS, trying to summarize the most important aspects to be considered by programming mobile devices like iPhone and iPad. Because iOS environment, is strictly a object-oriented one(OOP, control flows are not obvious, besides Apple® use design patterns highly recommended in this type of programming. Here we introduces some of them.

  20. ''Towards a High-Performance and Robust Implementation of MPI-IO on Top of GPFS''

    Energy Technology Data Exchange (ETDEWEB)

    Prost, J.P.; Tremann, R.; Blackwore, R.; Hartman, C.; Hedges, R.; Jia, B.; Kouiges, A.; White, A.

    2000-01-11

    MPI-IO/GPFS is a prototype implementation of the I/O chapter of the Message Passing Interface (MPI) 2 standard. It uses the IBM General Parallel File System (GPFS), with prototyped extensions, as the underlying file system. this paper describes the features of this prototype which support its high performance and robustness. The use of hints at the file system level and at the MPI-IO level allows tailoring the use of the file system to the application needs. Error handling in collective operations provides robust error reporting and deadlock prevention in case of returning errors.

  1. Using crowdsourced web content for informing water systems operations in snow-dominated catchments

    Science.gov (United States)

    Giuliani, Matteo; Castelletti, Andrea; Fedorov, Roman; Fraternali, Piero

    2016-12-01

    Snow is a key component of the hydrologic cycle in many regions of the world. Despite recent advances in environmental monitoring that are making a wide range of data available, continuous snow monitoring systems that can collect data at high spatial and temporal resolution are not well established yet, especially in inaccessible high-latitude or mountainous regions. The unprecedented availability of user-generated data on the web is opening new opportunities for enhancing real-time monitoring and modeling of environmental systems based on data that are public, low-cost, and spatiotemporally dense. In this paper, we contribute a novel crowdsourcing procedure for extracting snow-related information from public web images, either produced by users or generated by touristic webcams. A fully automated process fetches mountain images from multiple sources, identifies the peaks present therein, and estimates virtual snow indexes representing a proxy of the snow-covered area. Our procedure has the potential for complementing traditional snow-related information, minimizing costs and efforts for obtaining the virtual snow indexes and, at the same time, maximizing the portability of the procedure to several locations where such public images are available. The operational value of the obtained virtual snow indexes is assessed for a real-world water-management problem, the regulation of Lake Como, where we use these indexes for informing the daily operations of the lake. Numerical results show that such information is effective in extending the anticipation capacity of the lake operations, ultimately improving the system performance.

  2. A hypertext information system for standard operating procedures in haematological intensive care.

    Science.gov (United States)

    Horsch, A; Sokol, R; Heneka, D; Lasic, G

    1997-01-01

    In times of cost reduction efforts the role of standard operating procedures for both medical and nursing procedures gets increasing importance. Such standards are necessary if the quality of patient care shall not suffer but even improve. While some sophisticated approaches are coming up with generation of clinical processes from formal protocol models in connection with documentation systems the clinical practice actually looks quite different: Paper-based "operating standards" are used in day-to-day work, if any. In this paper a simple and powerful WWW-based hypertext information system for easy provision and maintenance of nursing standards is presented.

  3. Analysis of Information Sharing Mechanism in the Food Industry Green Supply Chain Management and Operation Process

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    In order to effectively address the issues of environmental pollution and food safety in food industry,the green supply chain management should be used in the food industry.However,information sharing is the basis of supply chain management.For this purpose,on the basis of describing the connotation of food industry green supply chain management,the paper introduces the contents and the effects of information sharing mode in detail.It focuses on the barriers of the implementation of information-sharing mechanisms in the food industry green supply chain management and operation process and analyzes the necessity of using information sharing mechanism among the members of the food industry green supply chain management mode by game theory,so as to strengthen the competitiveness of enterprises through supply chain management.

  4. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Directory of Open Access Journals (Sweden)

    Yunchuan Guo

    2014-01-01

    Full Text Available Access control is a key technology in providing security in the Internet of Things (IoT. The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC. STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM and the election-based update mechanism (EUM. We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  5. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  6. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  7. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2017-01-01

    Full Text Available Internet of things (IoT aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.

  8. Operational Reliability Assessment of Compressor Gearboxes with Normalized Lifting Wavelet Entropy from Condition Monitoring Information

    Directory of Open Access Journals (Sweden)

    Xiaoli Zhang

    2015-05-01

    Full Text Available Classical reliability assessment methods have predominantly focused on probability and statistical theories, which are insufficient in assessing the operational reliability of individual mechanical equipment with time-varying characteristics. A new approach to assess machinery operational reliability with normalized lifting wavelet entropy from condition monitoring information is proposed, which is different from classical reliability assessment methods depending on probability and statistics analysis. The machinery vibration signals with time-varying operational characteristics are firstly decomposed and reconstructed by means of a lifting wavelet package transform. The relative energy of every reconstructed signal is computed as an energy percentage of the reconstructed signal in the whole signal energy. Moreover, a normalized lifting wavelet entropy is defined by the relative energy to reveal the machinery operational uncertainty. Finally, operational reliability degree is defined by the quantitative value obtained by the normalized lifting wavelet entropy belonging to the range of [0, 1]. The proposed method is applied in the operational reliability assessment of the gearbox in an oxy-generator compressor to validate the effectiveness.

  9. Devising a Secure Architecture of Internet of Everything (IoE to Avoid the Data Exploitation in Cross Culture Communications

    Directory of Open Access Journals (Sweden)

    Asim Majeed

    2016-04-01

    Full Text Available The communication infrastructure among various interconnected devices has revolutionized the process of collecting and sharing information. This evolutionary paradigm of collecting, storing and analyzing data streams is called the Internet of Everything (IoE. The information exchange through IoE is fast and accurate but leaves security issues. The emergence of IoE has seen a drift from a single novel technology to several technological developments. Managing various technologies under one infrastructure is complex especially when a network is openly allowing nodes to access it. Access transition of infrastructures from closed networked environments to the public internets has raised security issues. The consistent growth in IoE technology is recognized as a bridge between physical, virtual and cross-cultural worlds. Modern enterprises are becoming reliant on interconnected wireless intelligent devices and this has put billions of user’s data in risk. The interference and intrusion in any infrastructure have opened the door of public safety concerns because this interception could compromise the user’s personal data as well as personal privacy. This research aims to adopt a holistic approach to devising a secure IoE architecture for cross-culture communication organizations, with attention paid to the various technological wearable devices, their security policies, communication protocols, data format and data encryption features to avoid the data exploitation. A systems methodology will be adopted with a view to developing a secure IoE model which provides for a generic implementation after analyzing the critical security features to minimize the risk of data exploitations. This would combine the ability of IoE to connect, communicate, and remotely manage an incalculable number of networked, automated devices with the security properties of authentication, availability, integrity and confidentiality on a configurable basis. This will help

  10. Satellite-Based Derivation of High-Resolution Forest Information Layers for Operational Forest Management

    Directory of Open Access Journals (Sweden)

    Johannes Stoffels

    2015-06-01

    Full Text Available A key factor for operational forest management and forest monitoring is the availability of up-to-date spatial information on the state of forest resources. Earth observation can provide valuable contributions to these information needs. The German federal state of Rhineland-Palatinate transferred its inherited forest information system to a new architecture that is better able to serve the needs of centralized inventory and planning services, down to the level of forest districts. During this process, a spatially adaptive classification approach was developed to derive high-resolution forest information layers (e.g., forest type, tree species distribution, development stages based on multi-temporal satellite data. This study covers the application of the developed approach to a regional scale (federal state level and the further adaptation of the design to meet the information needs of the state forest service. The results confirm that the operational requirements for mapping accuracy can, in principle, be fulfilled. However, the state-wide mapping experiment also revealed that the ability to meet the required level of accuracy is largely dependent on the availability of satellite observations within the optimum phenological time-windows.

  11. Contracts and Information Structure in a Supply Chain with Operations and Marketing Interaction

    DEFF Research Database (Denmark)

    El Ouardighi, F.; Erickson, G.; Grass, D.

    2016-01-01

    The objective of the paper is to study how wholesale price and revenue sharing contracts affect operations and marketing decisions in a supply chain under different dynamic informational structures. We suggest a differential game model of a supply chain consisting of a manufacturer and a single...... retailer that agree on the contract parameters at the outset of the game. The model includes key operational and marketing activities related to a single product in the supply chain. The manufacturer sets a production rate and the rate of advertising efforts while the retailer chooses a purchase rate......), or precommit to a plan of action during the whole game (open-loop Nash strategy). Given a contract type, the impact of the availability of information regarding the state of the game on the firms' decisions and payoffs is investigated. It is shown that double marginalization can be better mitigated...

  12. OMNIITOX - operational life-cycle impact assessment models and information tools for practitioners

    DEFF Research Database (Denmark)

    Molander, S; Lidholm, Peter; Schowanek, Diederik

    2004-01-01

    of this case study-driven project are briefly presented and put in relation to the aims of contributing to an operational life cycle-impact assessment (LCIA) model for impacts of toxicants. The present situation has been characterised by methodological difficulties, both regarding choice......This article is the preamble to a set of articles describing initial results from an on-going European Commission funded, 5th Framework project called OMNIITOX, Operational Models aNd Information tools for Industrial applications of eco/TOXicological impact assessments. The different parts...... of the characterisation model(s) and limited input data on chemical properties, which often has resulted in the omission of toxicants from the LCIA, or at best focus on well characterised chemicals. The project addresses both problems and integrates models, as well as data, in an information system – the OMNIITOX IS...

  13. ENSO detection and use to inform the operation of large scale water systems

    Science.gov (United States)

    Pham, Vuong; Giuliani, Matteo; Castelletti, Andrea

    2016-04-01

    El Nino Southern Oscillation (ENSO) is a large-scale, coupled ocean-atmosphere phenomenon occurring in the tropical Pacific Ocean, and is considered one of the most significant factors causing hydro-climatic anomalies throughout the world. Water systems operations could benefit from a better understanding of this global phenomenon, which has the potential for enhancing the accuracy and lead-time of long-range streamflow predictions. In turn, these are key to design interannual water transfers in large scale water systems to contrast increasingly frequent extremes induced by changing climate. Despite the ENSO teleconnection is well defined in some locations such as Western USA and Australia, there is no consensus on how it can be detected and used in other river basins, particularly in Europe, Africa, and Asia. In this work, we contribute a general framework relying on Input Variable Selection techniques for detecting ENSO teleconnection and using this information for improving water reservoir operations. Core of our procedure is the Iterative Input variable Selection (IIS) algorithm, which is employed to find the most relevant determinants of streamflow variability for deriving predictive models based on the selected inputs as well as to find the most valuable information for conditioning operating decisions. Our framework is applied to the multipurpose operations of the Hoa Binh reservoir in the Red River basin (Vietnam), taking into account hydropower production, water supply for irrigation, and flood mitigation during the monsoon season. Numerical results show that our framework is able to quantify the relationship between the ENSO fluctuations and the Red River basin hydrology. Moreover, we demonstrate that such ENSO teleconnection represents valuable information for improving the operations of Hoa Binh reservoir.

  14. On the Benefits and Challenges of Crowd-Sourced Network Performance Measurements for IoT Scenarios

    DEFF Research Database (Denmark)

    Mikkelsen, Lars Møller; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2017-01-01

    Systems within IoT domains such as ITS, Smart City, Smart Grid and other, often rely on real-time information and communication. These types of systems often include geographically distributed nodes which are connected via cellular or other wireless networks. This means great variability and unce......Systems within IoT domains such as ITS, Smart City, Smart Grid and other, often rely on real-time information and communication. These types of systems often include geographically distributed nodes which are connected via cellular or other wireless networks. This means great variability...

  15. Preemptible I/O Scheduling of Garbage Collection for Solid State Drives

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Junghee [ORNL; Kim, Youngjae [ORNL; Shipman, Galen M [ORNL; Oral, H Sarp [ORNL; Kim, Jongman [Georgia Institute of Technology

    2012-01-01

    Abstract Unlike hard disks, flash devices use out-of-update operations and they require a garbage collection (GC) process to reclaim invalid pages to create free blocks. This GC process is a major cause of performance degradation when running concurrently with other I/O operations as internal bandwidth is consumed to reclaim these invalid pages. The invocation of the GC process is generally governed by a low watermark on free blocks and other internal device metrics that different workloads meet at different intervals. This results in I/O performance that is highly dependent on workload characteristics. In this paper, we examine the GC process and propose a semi-preemptible GC scheme that allows GC processing to be preempted while pending I/O requests in the queue are serviced. Moreover, we further enhance flash performance by pipelining internal GC operations and merge them with pending I/O requests whenever possible. Our experimental evaluation of this semipreemptible GC scheme with realistic workloads demonstrate both improved performance and reduced performance variability. Write-dominant workloads show up to a 66.56% improvement in average response time with a 83.30% reduced variance in response time compared to the non-preemptible GC scheme. In addition, we explore opportunities of a new NAND flash device that supports suspend/resume commands for read, write and erase operations for fully preemptible GC. Our experiments with a fully preemptible GC enabled flash device show that request response time can be improved by up to 14.57% compared to semi-preemptible GC.

  16. CCM-R: Secure Counter Synchronization for IoT Wireless Link

    DEFF Research Database (Denmark)

    Roy, Upal; Yin, Jiachen; Andersen, Birger

    2016-01-01

    In this paper we propose and evaluate a new version of the CCM mode of operation, CCM-R, which isan extended and alternate version of the original CBC-MAC with Counter Mode(CCM) that was created to address the problem of counter synchronization. While CCM is considered secure when used/implemente...... it suitable for low-power wireless IoT devices....

  17. Vývoj mobilní aplikace pro platformu iOS

    OpenAIRE

    Aldorf, David

    2016-01-01

    This Bachelor's thesis deal with the development of mobile applications for iOS operating system. Creating of application was based on theoretical knowledge gained in the theoretic part of the bachelor's thesis. It was made a comparison of development environment based on chosen scoring method. The Chosen development environment was Xcode IDE developer by Apple Inc. Then it was create a logical design that contains the layout and describes the functionality of the application. Based on logica...

  18. CCM-R: Secure Counter Synchronization for IoT Wireless Link

    DEFF Research Database (Denmark)

    Roy, Upal; Yin, Jiachen; Andersen, Birger

    2016-01-01

    In this paper we propose and evaluate a new version of the CCM mode of operation, CCM-R, which isan extended and alternate version of the original CBC-MAC with Counter Mode(CCM) that was created to address the problem of counter synchronization. While CCM is considered secure when used/implemente...... it suitable for low-power wireless IoT devices....

  19. Lemon: An MPI parallel I/O library for data encapsulation using LIME

    Science.gov (United States)

    Deuzeman, Albert; Reker, Siebren; Urbach, Carsten; ETM Collaboration

    2012-06-01

    We introduce Lemon, an MPI parallel I/O library that provides efficient parallel I/O of both binary and metadata on massively parallel architectures. Motivated by the demands of the Lattice Quantum Chromodynamics community, the data is stored in the SciDAC Lattice QCD Interchange Message Encapsulation format. This format allows for storing large blocks of binary data and corresponding metadata in the same file. Even if designed for LQCD needs, this format might be useful for any application with this type of data profile. The design, implementation and application of Lemon are described. We conclude with presenting the excellent scaling properties of Lemon on state-of-the-art high performance computers. Program summaryProgram title: Lemon Catalogue identifier: AELP_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AELP_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU General Public License version 3 No. of lines in distributed program, including test data, etc.: 32 860 No. of bytes in distributed program, including test data, etc.: 223 762 Distribution format: tar.gz Programming language: MPI and C Computer: Any which supports MPI I/O Operating system: Any Has the code been vectorised or parallelised?: Yes. Includes MPI directives. RAM: Depending on input used Classification: 11.5 External routines: MPI Nature of problem: Distributed file I/O with metadata Solution method: MPI parallel I/O based implementation of LIME format Running time: Varies depending on file and architecture size, in the order of seconds

  20. In situ measurements of IO and reactive iodine aboard the RV Sonne during SHIVA

    Science.gov (United States)

    Heard, Dwayne; Walker, Hannah; Ingham, Trevor; Huang, Ru-Jin; Wittrock, Folker

    2013-04-01

    Halogenated very short-lived substances (VSLS) are emitted from the oceans by marine species such as macroalgae and phytoplankton and contribute to halogen loading in the troposphere and lower stratosphere. The SHIVA (Stratospheric Ozone: Halogen Impacts in a Varying Atmosphere) project combined ship-borne, aircraft-based and ground-based measurements in and over the South China Sea and the Sulu Sea, and around the coast of Malaysian Borneo. In this paper we present measurements of IO radicals in coastal and open ocean regions made onboard the German research vessel RV Sonne in November 2011 between Singapore and Manila, via the northern coast of Malaysian Borneo (South China Sea) and the Sulu Sea. In situ measurements of IO were made on 12 days by the University of Leeds laser-induced fluorescence (LIF) instrument, with a detection limit of 0.3 pptv for a 30 minute averaging period. The cruise average IO concentration was found to be 1.2 pptv, with a maximum concentration of 2.4 pptv in the middle of the Sulu Sea, an area known for high biological activity. Only a weak diurnal profile was observed, with IO detected above the detection limit on 10 out of the 11 nights when the LIF instrument was operational. Measurements of IO at night in the open ocean have not previously been reported and indicate the presence of gas phase or heterogeneous mechanisms that recycle iodine species without requiring light. There was reasonable agreement for IO concentrations measured by the University of Leeds LIF and the University of Bremen MAX-DOAS instruments, for which a comparison will be presented. I2, ICl and HOI were measured by the University of Mainz using a coupled diffusion denuder system followed by analysis using gas chromatography coupled with ion trap mass spectroscopy, with a detection of 0.17 pptv for 30 mins (I2). The cruise average I2 concentration was found to be 2.0 pptv, with a maximum concentration observed during one night of 12.7 pptv on the northern coast

  1. Supporting Analysis and Audit of Collaborative OAIS’s by use of an Outer OAIS – Inner OAIS (OO-IO) Model

    DEFF Research Database (Denmark)

    Zierau, Eld; McGovern, Nancy

    2014-01-01

    explanations and diagrams to demonstrate the ability of the OO-IO model to address distributed digital preservation conformance with the Open Archival Information System (OAIS) Reference Model. It is argued that the OO-IO model contributes a necessary extension to the literature of the digital preservation...... the known threats to digital content through time. The main purpose of the paper is to present an Outer OAIS-Inner OAIS (OO-IO) Model that can support the analysis and audit of collaborative interactions between multiple OAIS’s to enable distributed digital preservation. The paper provides extensive...... community to address the analysis and audit necessary for distributed digital preservation....

  2. Framework for Analyzing Android I/O Stack Behavior: From Generating theWorkload to Analyzing the Trace

    Directory of Open Access Journals (Sweden)

    Sooman Jeong

    2013-12-01

    Full Text Available Abstract: The existing I/O workload generators and trace capturing tools are not adaptable to generating nor capturing the I/O requests of Android apps. The Android platform needs proper tools to capture and replay real world workload in the Android platform to verify the result of benchmark tools. This paper introduces Android Storage Performance Analysis Tool, AndroStep, which is specifically designed for characterizing and analyzing the behavior of the I/O subsystem in Android based devices. The AndroStep consists of Mobibench (workload generator, MOST (Mobile Storage Analyzer, and Mobigen (workload replayer. Mobibench is an Android app that generates a filesystem as well as SQLite database operations. Mobibench can also vary the number of concurrent threads to examining the filesystem scalability to support concurrency, e.g., metadata updates, journal file creation/deletion. MOST captures the trace and extracts key filesystem access characteristics such as access pattern with respect to file types, ratio between random vs. sequential access, ratio between buffered vs. synchronous I/O, fraction of metadata accesses, etc. MOST implements reverse mapping feature (finding an inode for a given block and retrospective reverse mapping (finding an inode for a deleted file. Mobigen is a trace capturing and replaying tool that is specifically designed to perform the user experiment without actual human intervention. Mobigen records the system calls generated from the user behavior and sanitizes the trace for replayable form. Mobigen can replay this trace on different Android platforms or with different I/O stack configurations. As an example of using AndroStep, we analyzed the performances of twelve Android smartphones and the SQLite performances on five different filesystems. AndroStep makes otherwise time consuming I/O stack analysis extremely versatile. AndroStep makes a significant contribution in terms of shedding light on internal behavior of

  3. Io: Intensive Heating and Degassing, Rising and Falling Stripes In Crossing Wavy Patterns Do Not Require Molten Interior

    Science.gov (United States)

    Kochemasov, G.

    micron outbursts are reported [4]. They could be produced by the heated Io's body. Surprisingly, 5 micron (0.0056 mm) oscil- 1 lations we calculate for Amalthea. The 2002 y. meeting "Galileo" with Amalthea will bring additional information. References: [1] Kochemasov G.G.(1999) Theorems of wave planetary tectonics // Geophys. Res. Abstr., v.1, #3, 700; [2] Kochemasov G.G. (2001) Vernadsky-Brown 34th microsymp. Topics in comparative planetology. Abstr., Moscow, (CD-ROM); [3] Kochemasov G.G. (1997) Ibid. 26th, 58-59; [4]Sinton W.M. (1980) Astrophys.J., v. 235, #1, 149-151. 2

  4. A ROOT/IO Based Software Framework for CMS

    CERN Document Server

    Tanenbaum, W

    2003-01-01

    The implementation of persistency in the Compact Muon Solenoid (CMS) Software Framework uses the core I/O functionality of ROOT. We will discuss the current ROOT/IO implementation, its evolution from the prior Objectivity/DB implementation, and the plans and ongoing work for the conversion to "POOL", provided by the LHC Computing Grid (LCG) persistency project.

  5. KNL I/O on Gadget and Trinitite

    Energy Technology Data Exchange (ETDEWEB)

    Torrez, Alfred [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-11-08

    These are slides from a KNL working group presentation. The following topics are covered: KNL I/O testing on Gadget (IOR, N-N, N-1, various ppn, mode comparison), KNL and Haswell I/O testing on Trinitite (IOR, N-N, N-1 Haswell/KNL comparison), and bug fixes/next steps.

  6. Beginning iOS 3D unreal games development

    CERN Document Server

    Chin, Robert

    2012-01-01

    Aims to be first book on the market concerning iOS 3D game apps development using the Unreal UDK Unreal UDK and scripting engine are popular emerging tools used for building games like those you see from Epic iOS and mobile game apps development are popular tech and book markets

  7. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    Directory of Open Access Journals (Sweden)

    Schulte Christopher

    2011-12-01

    Full Text Available Hoog, A., & Strzempka, K. (2011. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota (cschulte@lucidatainc.comThese are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate and defendable results.(see PDF for full review

  8. Hash-chain-based authentication for IoT

    Directory of Open Access Journals (Sweden)

    Antonio PINTO

    2016-12-01

    Full Text Available The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT. Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices perform data collection. The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy. The current work proposes a modified hash-chain authentication mechanism that, with the help of a smartphone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP while using open wireless networks. Moreover, the proposed authentication mechanism adheres to the stateless, HTTP-like behavior expected of REST web-services, even allowing the caching of server authentication replies within a predefined time window. No other known web-service authentication mechanism operates in such manner.

  9. An IoT Based Predictive Connected Car Maintenance Approach

    Directory of Open Access Journals (Sweden)

    Rohit Dhall

    2017-03-01

    Full Text Available Internet of Things (IoT is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This paper discusses one such use case, which can be implemented by the automobile industry, using technological advancements in the areas of IoT and Analytics. ‘Connected Car’ is a terminology, often associated with cars and other passenger vehicles, which are capable of internet connectivity and sharing of various kinds of data with backend applications. The data being shared can be about the location and speed of the car, status of various parts/lubricants of the car, and if the car needs urgent service or not. Once data are transmitted to the backend services, various workflows can be created to take necessary actions, e.g. scheduling a service with the car service provider, or if large numbers of care are in the same location, then the traffic management system can take necessary action. ’Connected cars’ can also communicate with each other, and can send alerts to each other in certain scenarios like possible crash etc. This paper talks about how the concept of ‘connected cars’ can be used to perform ‘predictive car maintenance’. It also discusses how certain technology components, i.e., Eclipse Mosquito and Eclipse Paho can be used to implement a predictive connected car use case.

  10. Information delivery in team communication of MCR operators for an emergency task

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Kwang Sub; Park, Jin Kyun; Jung, Won Dae

    2005-01-01

    Team performance is a major measure to evaluate the ability of team when a lot of people perform a task of common purpose such as the main control room operators in the nuclear power plant. A team performance is affected the collaboration and communication among operators under dynamic situation as well as by the cognitive process of each team member. Specially, under the emergency situation, more clear and apparent communication in a team is a critical key for the appropriate response to emergency situation. As a general human factor analysis accesses the operator's behavior, it leads to a resulting action of planning, decision, problem-solving. In order to access the internal information and background information of his/her behavior, the verbal protocol analysis is applied. The impact factors on the team performance are derived from the state of the art for team performance, and it is found that the communication is a common key for all impact factors. And, in turn, the impact factors for the communication are accesses and the more detailed analysis is performed. The recorded data for the operator training for emergency situation of nuclear power plant training center are analyzed according to the verbal protocol analysis that are being generally utilized in cognitive psychology, educational psychology, and cognitive science. Two aspects, external (syntax) and internal (symantic) aspects of communication are reviewed. From the syntax analysis, it is found that the task of each step in EOP is separated according to each corresponding operator and the ordinary training is important, and the weak-points for a sentence presentation can be found team-by-team. And, from the symantic analysis for the diagnostic procedure of EOP is performed and the communication errors due to different situation awareness by operators could be found, and it lead to a diagnosis failure. The factors for different symantic cognition for a situation are analyzed and the affecting

  11. Multi-Purpose, Application-Centric, Scalable I/O Proxy Application

    Energy Technology Data Exchange (ETDEWEB)

    2015-06-15

    MACSio is a Multi-purpose, Application-Centric, Scalable I/O proxy application. It is designed to support a number of goals with respect to parallel I/O performance testing and benchmarking including the ability to test and compare various I/O libraries and I/O paradigms, to predict scalable performance of real applications and to help identify where improvements in I/O performance can be made within the HPC I/O software stack.

  12. Mobile Virtual Network Operator Information Systems for Increased Sustainability in Utilities

    DEFF Research Database (Denmark)

    Joensen, Hallur Leivsgard; Tambo, Torben

    2011-01-01

    In today’s research on creating a more sustainable energy utilisation in society, much effort is directed towards producing or consuming energy. This focus tends to overlook the fact that energy needs to be sold and distributed to the consumers in increasingly open marketplaces where the marketing...... Virtual Network Operator (MVNO). Emphasis is particularly on standardised information systems for automatically linking consumers, sellers and integration of network infrastructure actors. The method used is a feasibility study assessing business and information processes of a forthcoming utilities market......, sales and buying processes are separated from physical networks and energy production. This study aims to characterise and evaluate information systems supporting the transformation of the free market-orientation of energy and provision of utilities in a cross-sectorial proposition known as Mobile...

  13. THE ROLE OF TECHNICAL CONSUMPTION CALCULATION MODELS ON ACCOUNTING INFORMATION SYSTEMS OF PUBLIC UTILITIES SERVICES OPERATORS

    Directory of Open Access Journals (Sweden)

    GHEORGHE CLAUDIU FEIES

    2012-05-01

    Full Text Available After studying how the operators’ management works, an influence of the specific activities of public utilities on their financial accounting system can be noticed. The asymmetry of these systems is also present, resulting from organization and specific services, which implies a close link between the financial accounting system and the specialized technical department. The research methodology consists in observing specific activities of public utility operators and their influence on information system and analysis views presented in the context of published work in some journals. It analyses the impact of technical computing models used by public utility community services on the financial statements and therefore the information provided by accounting information system stakeholders.

  14. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  15. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  16. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  17. An evaluation of inter-organisational information systems development on business partnership relations

    Directory of Open Access Journals (Sweden)

    Williamson, E.A.

    2007-01-01

    Full Text Available Inter-organisational information systems (IOS are being used within SCM to improve businesses processes and to facilitate closer working relations with business partners. However, the technologies themselves impact on this relationship as they allow various levels of information flows, communications, function integration and partner integration.The aim of this paper is to evaluate IOS development influencing partnership integration within Supply Chain Management (SCM by investigating thirteen businesses that use a variety of IOS. IOS are classified into Elementary IOS, Intermediate IOS and Advanced IOS. Organisational variables such as information flows, partner co-ordination and integration, partner trust and confidence are measured against the level of IOS development. Variables such as management commitment, financial costs, system standards and partner resistance are investigated as forces or barriers, and related to different levels of IOS development.This research concludes that IOS development results in increased information flows and coordination which supports the development of trust and confidence in business partners. However, the customer position in the supply chain, whether it be retailer, distributor or manufacturer can influence the use of IOS of its business partners. Also, although IOS allows businesses to source and contact a larger range of business partners, the tendency is for businesses to use a smaller number of partners. This work also shows that IOS development changes a business’s relationship with its partners and moves it towards partnership integration.However, a number of organisational factors impact on this integration. These factors vary with the level of IOS development. Management commitment and showing the requirement for IOS development can act as a positive force in developing IOS or as a barrier against IOS development. Other barriers include resistance from business partners, financial costs, lack of

  18. QUALITY OF INTER-ORGANIZATIONAL SYSTEM (IOS FRAMEWORK FOR SUPPLY CHAIN MANAGEMENT (SCM: STUDY OF SIX COLLABORATIVE FACTORS FROM SUPPLIER AND CUSTOMER PERSPECTIVES

    Directory of Open Access Journals (Sweden)

    Miloš Mihajlović

    2010-09-01

    Full Text Available This paper has identified a research gap to study how organizations collaborate together to adopt Inter- Organizational System (IOS for Supply Chain Management (SCM. We propose such a framework and then use four theories, namely resource dependency theory, organizational theory, actor-network theory and negotiated order theory, to understand how the framework supports management collaboration and interaction in the adoption of an IOS. This adoption framework is proposed to better study how senior management staff, from both supplier and customer perspectives, collaborate and interact in the IOS adoption process. The framework has been constructed from the literature identifying six major aspects for consideration namely: inter and intra organizational collaboration; strategic management approaches; supply chain design (SCD; business process redesign/reengineering (BPR; information systems (IS / information technology (IT architecture and external environmental factors. From customer and supplier perspectives the adoption of IOS for SCM, makes a significant contribution to knowledge in this field.

  19. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  20. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  1. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Directory of Open Access Journals (Sweden)

    Antonio Celesti

    2017-02-01

    Full Text Available Nowadays, in the panorama of Internet of Things (IoT, finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  2. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    Directory of Open Access Journals (Sweden)

    V. Beltran

    2017-01-01

    Full Text Available Much has been said about the benefits that the Internet of Things (IoT will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Reference Model (IoT-ARM is a European effort for promoting IoT quality aspects such as security and privacy. This paper paves the way to the adoption of reference architectures by describing the application of the IoT-ARM within a European-funded project, SMARTIE. The SMARTIE architecture has been designed to empower citizens to take control of their IoT devices and privacy, while guaranteeing scalability for large deployments in smart cities.

  3. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    Science.gov (United States)

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  4. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    Science.gov (United States)

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  5. 76 FR 35462 - Proposed Renewal of Information Collection; Source Directory of American Indian and Alaska Native...

    Science.gov (United States)

    2011-06-17

    ... to iacb@ios.doi.gov . Please mention that your comments concern the Source Directory, OMB Control... iacb@ios.doi.gov or by facsimile to (202) 208-5196. SUPPLEMENTARY INFORMATION: I. Abstract The...

  6. Io Volcanism: Modeling Vapor And Heat Transport

    Science.gov (United States)

    Allen, Daniel R.; Howell, R. R.

    2010-10-01

    Loki is a large, active volcanic source on Jupiter's moon, Io, whose overall temperatures are well explained by current cooling models, but there are unexplainable subtleties. Using the SO2 atmospheric models of Ingersoll (1989) as a starting point, we are investigating how volatiles, specifically sulfur, are transported on the surface and how they modify the temperatures at Loki and other volcanoes. Voyager images reveal light colored deposits, colloquially called "sulfur bergs,” on Loki's dark patera floor that may be sulfur fumaroles. Galileo images show the presence of red short-chain sulfur deposits around the patera. We are investigating the mechanisms that lead to these features. The light deposits are a few kilometers across. Calculations of the mean free paths for day time conditions on Io indicate lengths on the order of 0.1 km while poorly constrained night time conditions indicate mean free paths about 100 times greater, on the order of what is needed to produce the deposits under ballistic conditions. Preliminary calculations reveal horizontal transport length scales for diffuse transport in a collisional atmosphere of approximately 30 km for sublimating S8 sulfur at 300 K. These length scales would be sufficient to move the sulfur from the warm patera floor to the locations of the red sulfur deposits. At a typical Loki temperature of 300 K, the sublimation/evaporation rate of S8 is a few tens of microns/day. It then requires just a few days to deposit an optically thick 100 µm layer of material. Preliminary length scales and sublimation rates are thus of sufficient scale to produce the deposits. Investigations into the sulfur transport and its effect on temperature are ongoing.

  7. Program on stimulating operational private sector use of Earth observation satellite information

    Science.gov (United States)

    Eastwood, L. F., Jr.; Foshage, J.; Gomez, G.; Kirkpatrick, B.; Konig, B.; Stein, R. (Principal Investigator)

    1981-01-01

    Ideas for new businesses specializing in using remote sensing and computerized spatial data systems were developd. Each such business serves as an 'information middleman', buying raw satellite or aircraft imagery, processing these data, combining them in a computer system with customer-specific information, and marketing the resulting information products. Examples of the businesses the project designed are: (1) an agricultural facility site evaluation firm; (2) a mass media grocery price and supply analyst and forecaster; (3) a management service for privately held woodlots; (4) a brokerage for insulation and roofing contractors, based on infrared imagery; (5) an expanded real estate information service. In addition, more than twenty-five other commercially attractive ideas in agribusiness, forestry, mining, real estate, urban planning and redevelopment, and consumer information were created. The commercial feasibility of the five business was assessed. This assessment included market surveys, revenue projections, cost analyses, and profitability studies. The results show that there are large and enthusiastic markets willing to pay for the services these businesses offer, and that the businesses could operate profitably.

  8. Operation reliability assessment for cutting tools by applying a proportional covariate model to condition monitoring information.

    Science.gov (United States)

    Cai, Gaigai; Chen, Xuefeng; Li, Bing; Chen, Baojia; He, Zhengjia

    2012-09-25

    The reliability of cutting tools is critical to machining precision and production efficiency. The conventional statistic-based reliability assessment method aims at providing a general and overall estimation of reliability for a large population of identical units under given and fixed conditions. However, it has limited effectiveness in depicting the operational characteristics of a cutting tool. To overcome this limitation, this paper proposes an approach to assess the operation reliability of cutting tools. A proportional covariate model is introduced to construct the relationship between operation reliability and condition monitoring information. The wavelet packet transform and an improved distance evaluation technique are used to extract sensitive features from vibration signals, and a covariate function is constructed based on the proportional covariate model. Ultimately, the failure rate function of the cutting tool being assessed is calculated using the baseline covariate function obtained from a small sample of historical data. Experimental results and a comparative study show that the proposed method is effective for assessing the operation reliability of cutting tools.

  9. Use of reconnaissance level information for environmental assessment. [Information available from existing sources that satisfies information needs of siting and operational aspects of NPP

    Energy Technology Data Exchange (ETDEWEB)

    Foster, R.F.; Rickard, W.H.; Strand, J.A.; Warner, M.L.

    1979-11-01

    Reconnaissance level information (RLI) sufficient for comparing the environmental and socio-economic features of candidate sites for nuclear power stations and for guiding plant design, baseline surveys, and operational practices is usually available from published reports, public records, and knowledgeable individuals. Environmental concerns of special importance for site evaluation include: aquatic ecology, terrestrial ecology, land and water use, socio-economics, and institutional constraints. A scheme is suggested for using RLI to assign classifications to candidate sites based on the potential level of concern associated with the different environmental features.

  10. 77 FR 12103 - Notice of Request for Approval of a New Information Collection: Exemptions for Air Taxi Operations

    Science.gov (United States)

    2012-02-28

    ... Notice of Request for Approval of a New Information Collection: Exemptions for Air Taxi Operations AGENCY... the following collection: Exemptions for Air Taxi Operations, responsibility for which has been... air carriers known as air taxi operators and their filing of a one-page form that enables them to...

  11. 76 FR 21395 - BOEMRE Information Collection Activity; 1010-0141, Subpart D, Oil and Gas Drilling Operations...

    Science.gov (United States)

    2011-04-15

    ...; 1010-0141, Subpart D, Oil and Gas Drilling Operations, Extension of a Collection; Comment Request... request (ICR) concerns the paperwork requirements related to oil and gas drilling operations, and related.... SUPPLEMENTARY INFORMATION: Title: 30 CFR Part 250, Subpart D, Oil and Gas Drilling Operations. BOEMRE...

  12. 75 FR 6250 - Notice of Submission to OMB for an Information Collection: National Census of Ferry Operators

    Science.gov (United States)

    2010-02-08

    ...: National Census of Ferry Operators AGENCY: Bureau of Transportation Statistics (BTS), Research and... collection related to the Nation's ferry operations. The information to be collected will be used to produce a descriptive database of existing ferry operations. A summary report of survey findings will be...

  13. Designing a Decision Making Support Information System for the Operational Control of Industrial Technological Processes

    Directory of Open Access Journals (Sweden)

    Adelina Faradian

    2015-08-01

    Full Text Available Fuzzy logic is a new and innovative technology that was used in order to develop a realization of engineering control. In recent years, fuzzy logic proved its great potential especially applied to automatization of industrial process control, where it enables the control design to be formed based on experience of experts and results of experiments. The projects that have been realized reveal that the application of fuzzy logic in the technological process control has already provided us with better decisions compared to that of standard control technique. Fuzzy logic provides an opportunity to design an advisory system for decision-making based on operator experience and results of experiments not taking a mathematical model as a basis. The present work deals with a specific technological process ─ designing a support decision making information system for the operational control of the lime kiln with the use of fuzzy logic based on creation of the relevant expert-objective knowledge base.

  14. Fragmented information management weakens sales operations; Fragmentiertes Informationsmanagement schwaecht den Vertrieb

    Energy Technology Data Exchange (ETDEWEB)

    Neumann, Norbert; Gronwald, Heiko [Steria Mummert Consulting, Hamburg (Germany)

    2011-07-15

    Three quarters of all companies that operate in the energy market, which is to say in an increasingly competitive environment, are planning to invest in the long-term improvement of their business processes. Together with the possibilities of microsegmentation, the growing flow of data from smart metering creates opportunities to make differentiated offers to one's more lucrative customers. However this presupposes a high-performing information structure with a company-wide system of data management and traffic control. This system must be capable of processing large data quantities, making data accessible for evaluation and at the same time of collating data from different operating systems while maintaining data consistency. This spells lots of homework for energy supply companies.

  15. Real time explosive hazard information sensing, processing, and communication for autonomous operation

    Energy Technology Data Exchange (ETDEWEB)

    Versteeg, Roelof J; Few, Douglas A; Kinoshita, Robert A; Johnson, Doug; Linda, Ondrej

    2015-02-24

    Methods, computer readable media, and apparatuses provide robotic explosive hazard detection. A robot intelligence kernel (RIK) includes a dynamic autonomy structure with two or more autonomy levels between operator intervention and robot initiative A mine sensor and processing module (ESPM) operating separately from the RIK perceives environmental variables indicative of a mine using subsurface perceptors. The ESPM processes mine information to determine a likelihood of a presence of a mine. A robot can autonomously modify behavior responsive to an indication of a detected mine. The behavior is modified between detection of mines, detailed scanning and characterization of the mine, developing mine indication parameters, and resuming detection. Real time messages are passed between the RIK and the ESPM. A combination of ESPM bound messages and RIK bound messages cause the robot platform to switch between modes including a calibration mode, the mine detection mode, and the mine characterization mode.

  16. Real time explosive hazard information sensing, processing, and communication for autonomous operation

    Energy Technology Data Exchange (ETDEWEB)

    Versteeg, Roelof J.; Few, Douglas A.; Kinoshita, Robert A.; Johnson, Douglas; Linda, Ondrej

    2015-12-15

    Methods, computer readable media, and apparatuses provide robotic explosive hazard detection. A robot intelligence kernel (RIK) includes a dynamic autonomy structure with two or more autonomy levels between operator intervention and robot initiative A mine sensor and processing module (ESPM) operating separately from the RIK perceives environmental variables indicative of a mine using subsurface perceptors. The ESPM processes mine information to determine a likelihood of a presence of a mine. A robot can autonomously modify behavior responsive to an indication of a detected mine. The behavior is modified between detection of mines, detailed scanning and characterization of the mine, developing mine indication parameters, and resuming detection. Real time messages are passed between the RIK and the ESPM. A combination of ESPM bound messages and RIK bound messages cause the robot platform to switch between modes including a calibration mode, the mine detection mode, and the mine characterization mode.

  17. Reducing the operational energy demand in buildings using building information modeling tools and sustainability approaches

    Directory of Open Access Journals (Sweden)

    Mojtaba Valinejad Shoubi

    2015-03-01

    Full Text Available A sustainable building is constructed of materials that could decrease environmental impacts, such as energy usage, during the lifecycle of the building. Building Information Modeling (BIM has been identified as an effective tool for building performance analysis virtually in the design stage. The main aims of this study were to assess various combinations of materials using BIM and identify alternative, sustainable solutions to reduce operational energy consumption. The amount of energy consumed by a double story bungalow house in Johor, Malaysia, and assessments of alternative material configurations to determine the best energy performance were evaluated by using Revit Architecture 2012 and Autodesk Ecotect Analysis software to show which of the materials helped in reducing the operational energy use of the building to the greatest extent throughout its annual life cycle. At the end, some alternative, sustainable designs in terms of energy savings have been suggested.

  18. MDTM: Optimizing Data Transfer using Multicore-Aware I/O Scheduling

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Liang [Fermilab; Demar, Phil [Fermilab; Wu, Wenji [Fermilab; Kim, Bockjoo [Florida U.

    2017-05-09

    Bulk data transfer is facing significant challenges in the coming era of big data. There are multiple performance bottlenecks along the end-to-end path from the source to destination storage system. The limitations of current generation data transfer tools themselves can have a significant impact on end-to-end data transfer rates. In this paper, we identify the issues that lead to underperformance of these tools, and present a new data transfer tool with an innovative I/O scheduler called MDTM. The MDTM scheduler exploits underlying multicore layouts to optimize throughput by reducing delay and contention for I/O reading and writing operations. With our evaluations, we show how MDTM successfully avoids NUMA-based congestion and significantly improves end-to-end data transfer rates across high-speed wide area networks.

  19. The incremental information content of earnings, working capital from operations, and cash flows

    Directory of Open Access Journals (Sweden)

    Simin Banifatemi Kashi

    2015-09-01

    Full Text Available This paper presents an empirical study to determine the effects of different factors including present profit, depreciation, working capital, operating cash flow and other accruals on future earnings stability. The study selects the information of 124 selected firms from Tehran Stock Exchange over the period 2006-2012. Using two regression analysis, the study has determined that as the fluctuation of profit increases, the profitability increases too. In addition, the study has concluded that firms with minimum fluctuations preserve more stable profitability. Moreover, firms with higher fluctuation in profitability maintain more volatile profitability for the next consecutive period.

  20. IoT Platforms: Analysis for Building Projects

    Directory of Open Access Journals (Sweden)

    Rusu Liviu DUMITRU

    2017-01-01

    Full Text Available This paper presents a general survey of IoT platforms in terms of features for IoT project de-velopers. I will briefly summarize the state of knowledge in terms of technology regarding “In-ternet of Things” first steps in developing this technology, history, trends, sensors and micro-controllers used. I have evaluated a number of 5 IoT platforms in terms of the features needed to develop a IoT project. I have listed those components that are most appreciated by IoT pro-ject developers and the results have been highlighted in a comparative analysis of these plat-forms from the point of view of IoT project developers and which are strictly necessary as a de-velopment environment for an IoT project based. I’ve also considered the users' views of such platforms in terms of functionality, advantages, disadvantages and dangers presented by this technology.

  1. Cassini Information Management System in Distributed Operations Collaboration and Cassini Science Planning

    Science.gov (United States)

    Equils, Douglas J.

    2008-01-01

    Launched on October 15, 1997, the Cassini-Huygens spacecraft began its ambitious journey to the Saturnian system with a complex suite of 12 scientific instruments, and another 6 instruments aboard the European Space Agencies Huygens Probe. Over the next 6 1/2 years, Cassini would continue its relatively simplistic cruise phase operations, flying past Venus, Earth, and Jupiter. However, following Saturn Orbit Insertion (SOI), Cassini would become involved in a complex series of tasks that required detailed resource management, distributed operations collaboration, and a data base for capturing science objectives. Collectively, these needs were met through a web-based software tool designed to help with the Cassini uplink process and ultimately used to generate more robust sequences for spacecraft operations. In 2001, in conjunction with the Southwest Research Institute (SwRI) and later Venustar Software and Engineering Inc., the Cassini Information Management System (CIMS) was released which enabled the Cassini spacecraft and science planning teams to perform complex information management and team collaboration between scientists and engineers in 17 countries. Originally tailored to help manage the science planning uplink process, CIMS has been actively evolving since its inception to meet the changing and growing needs of the Cassini uplink team and effectively reduce mission risk through a series of resource management validation algorithms. These algorithms have been implemented in the web-based software tool to identify potential sequence conflicts early in the science planning process. CIMS mitigates these sequence conflicts through identification of timing incongruities, pointing inconsistencies, flight rule violations, data volume issues, and by assisting in Deep Space Network (DSN) coverage analysis. In preparation for extended mission operations, CIMS has also evolved further to assist in the planning and coordination of the dual playback redundancy of

  2. The Antarctic Geospatial Information Center: Three Years of Supporting Antarctic Science and Operations

    Science.gov (United States)

    Herried, B.; Morin, P. J.; Larue, M.; Porter, C.; Niebuhr, S.; Antarctic Geospatial Information Center

    2010-12-01

    Founded in 2007, the Antarctic Geospatial Information Center (AGIC) is dedicated to supporting and promoting the United States Antarctic Program (USAP) by providing geospatial information to Antarctic science, operations, and education communities. Since its inception, AGIC contributes to Antarctic science in four significant ways: 1) by direct geospatial support of research groups to advance science, 2) by authoring maps and creating applications to facilitate better logistical support, 3) by serving as a data repository and clearinghouse for Antarctic geospatial data, 4) by providing expertise, analysis, and education to researchers, support staff, and students. This poster will showcase several products, tools, and services developed by AGIC in the past three years, including a collection of 150 ground control points in the McMurdo Dry Valleys and Ross Island, highly accurate maps in the McMurdo Sound region using satellite imagery, and an archive of historical USGS aerial photography accessed through a web-based search application.

  3. Patients' perception of quality of pre-operative informed consent in athens, Greece: a pilot study.

    Directory of Open Access Journals (Sweden)

    Matthew E Falagas

    Full Text Available BACKGROUND: We sought to perform a study to record and evaluate patients' views of the way surgeons communicate informed consent (IC in Greece. METHODOLOGY/PRINCIPAL FINDINGS: A prospective pilot study was carried out in Athens from 9/2007 to 4/2008. The study sample was extracted from patients, operated by eight different surgeons, who volunteered to fill in a post-surgery self-report questionnaire on IC. A composite delivered information index and a patient-physician relationship index were constructed for the purposes of the analysis. In total, 77 patients (42 males volunteered to respond to the questionnaire. The delivered information index scores ranged from 3 to 10, the mean score was 8, and the standard deviation (SD was 1.9. All patients were aware of their underlying diagnosis and reason for surgery. However, a considerable proportion of the respondents (14.3% achieved a score below or equal to 5. The patient-physician relationship scores ranged from 0 to 20, the mean score was 16 and the standard deviation (SD was 4.3. The better the patient-physician relationship, the more information was finally delivered to the patient from the physician (Spearman's rank-order correlation coefficient was 0.4 and p<0.001. Delivered information index was significantly higher among participants who comprehended the right to informed consent, compared to participants who did not (p<0.001, and among participants who were given information regarding other possible therapeutic options (p = 0.001. 43% of the respondents answered that less than 10 minutes were spent on the consent process, 58.4% of patients stated that they had not been informed about other possible therapeutic choices and 28.6% did not really comprehend their legal rights to IC. CONCLUSIONS: Despite the inherent limitations and the small sample size that do not permit to draw any firm conclusions, results indicate that a successful IC process may be associated with specific elements such as

  4. 模糊推理中蕴涵运算的信息度约束%Information Measure Requirement of Implication Operator in Fuzzy Reasoning

    Institute of Scientific and Technical Information of China (English)

    陈丹; 何华灿; 王晖

    2001-01-01

    This paper has comprehensively classified implication operations, and proposed information measure requirement of all implication operators by using Yager's specificity measure. Finally,Some typical implication operators are discussed to see if they satisfy the information measure requirement.

  5. booc.io: An Education System with Hierarchical Concept Maps and Dynamic Non-linear Learning Plans.

    Science.gov (United States)

    Schwab, Michail; Strobelt, Hendrik; Tompkin, James; Fredericks, Colin; Huff, Connor; Higgins, Dana; Strezhnev, Anton; Komisarchik, Mayya; King, Gary; Pfister, Hanspeter

    2017-01-01

    Information hierarchies are difficult to express when real-world space or time constraints force traversing the hierarchy in linear presentations, such as in educational books and classroom courses. We present booc.io, which allows linear and non-linear presentation and navigation of educational concepts and material. To support a breadth of material for each concept, booc.io is Web based, which allows adding material such as lecture slides, book chapters, videos, and LTIs. A visual interface assists the creation of the needed hierarchical structures. The goals of our system were formed in expert interviews, and we explain how our design meets these goals. We adapt a real-world course into booc.io, and perform introductory qualitative evaluation with students.

  6. Beginning Swift games development for iOS

    CERN Document Server

    Goodwill, James

    2015-01-01

    Game apps are one of the most popular categories in the Apple iTunes App Store. Well, the introduction of the new Swift programming language will make game development even more appealing and easier to existing and future iOS app developers. In response, James Goodwill, Wesley Matlock and Apress introduce you to this book, Beginning Swift Games Development for iOS. In this book, you'll learn the fundamental elements of the new Swift language as applied to game development for iOS. In part 1, you'll start with a basic 2D game idea and build the game throughout the book introducing each Sprit

  7. RubyMotion iOS develoment essentials

    CERN Document Server

    Nalwaya, Abhishek

    2013-01-01

    This is a step-by-step book that builds on your knowledge by adding to an example app over the course of each chapter. Each topic uses example code that can be compiled and tested to show how things work practically instead of just telling you the theory. Complicated tasks are broken down into easy to follow steps with clear explanations of what each line of code is doing.Whether you are a novice to iOS development or looking for a simpler alternative to Objective-C; with RubyMotion iOS Development Essentials, you will become a pro at writing great iOS apps

  8. A method for risk informing procedures at operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, P. F.; Martin del Campo, C., E-mail: pnelson_007@yahoo.com [UNAM, Facultad de Ingenieria, Departamento de Sistemas Energeticos, Paseo Cuauhnahuac No. 8532, Col. Progreso, 62550 Jiutepec, Morelos (Mexico)

    2012-10-15

    The technical approach presented establishes a framework intended to provide the necessary elements for a deployable human performance monitoring program that incorporates insights from plant specific probabilistic risk assessments, human reliability analysis, as well as the development of plant specific human failure data. A human performance monitoring program of this structure would be used to provide the ability to risk inform procedures (e.g., operations or maintenance) to determine the operational risk significance of procedural performance (i.e., precautions, prerequisites, procedure steps), the likelihood of consequential human error dur the performance of the procedure, and the identification of procedure specific barriers to reduce or eliminate consequential human errors. The program would provide the means to assess procedures prior to execution and the means to record and trend human failure events leading to a plant specific human failure database for human activities characterized as pre-initiator. The technical methods and data processing for each of these areas are developed and presented, as well as an example application of an operational procedure error leading to a plant level event (i.e, plant trip). (Author)

  9. Information management system for design, construction and operation of nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Bolch, M.C. (Duke Power Co. (US)); Jones, C.R. (S. Levy Inc. (US))

    1990-01-01

    This paper describes the principal requirements and features of a computerized information management system (IMS) believed to be a necessary part of the program to design, build and operate the next generation of nuclear power plants in the United States. This way a result of extensive review and input from an industry group studying future nuclear power plant construction improvements. The needs of the power plant constructor, owner and operator for such a computerized technical data base are described in terms of applications and scope and timing of turnover of the IMS by the plant designer. The applications cover the full life cycle of the plant including project control, construction activities, quality control, maintenance and operation. The scope of the IMS is also described in terms of the technical data to be included, hardware and software capabilities and training. The responsibilities of the plant designer for developing the IMS and generating the technical data base is defined as part of the plant process. The requirements to be met include a comprehensive plant data model and computer system hardware and software.

  10. Case studies of energy information systems and related technology: Operational practices, costs, and benefits

    Energy Technology Data Exchange (ETDEWEB)

    Motegi, Naoya; Piette, Mary Ann; Kinney, Satkartar; Dewey, Jim

    2003-09-02

    Energy Information Systems (EIS), which can monitor and analyze building energy consumption and related data throughout the Internet, have been increasing in use over the last decade. Though EIS developers describe the capabilities, costs, and benefits of EIS, many of these descriptions are idealized and often insufficient for potential users to evaluate cost, benefit and operational usefulness. LBNL has conducted a series of case studies of existing EIS and related technology installations. This study explored the following questions: (1) How is the EIS used in day-to-day operation? (2) What are the costs and benefits of an EIS? (3) Where do the energy savings come from? This paper reviews the process of these technologies from installation through energy management practice. The study is based on interviews with operators and energy managers who use EIS. Analysis of energy data trended by EIS and utility bills was also conducted to measure the benefit. This paper explores common uses and findings to identify energy savings attributable to EIS, and discusses non-energy benefits as well. This paper also addresses technologies related to EIS that have been demonstrated and evaluated by LBNL.

  11. Phase-space representations of symmetric informationally complete positive-operator-valued-measure fiducial states

    Science.gov (United States)

    Saraceno, Marcos; Ermann, Leonardo; Cormick, Cecilia

    2017-03-01

    The problem of finding symmetric informationally complete positive-operator-valued-measures (SIC-POVMs) has been solved numerically for all dimensions d up to 67 [A. J. Scott and M. Grassl, J. Math. Phys. 51, 042203 (2010), 10.1063/1.3374022], but a general proof of existence is still lacking. For each dimension, it was shown that it is possible to find a SIC-POVM that is generated from a fiducial state upon application of the operators of the Heisenberg-Weyl group. We draw on the numerically determined fiducial states to study their phase-space features, as displayed by the characteristic function and the Wigner, Bargmann, and Husimi representations, adapted to a Hilbert space of finite dimension. We analyze the phase-space localization of fiducial states, and observe that the SIC-POVM condition is equivalent to a maximal delocalization property. Finally, we explore the consequences in phase space of the conjectured Zauner symmetry. In particular, we construct a Hermitian operator commuting with this symmetry that leads to a representation of fiducial states in terms of eigenfunctions with definite semiclassical features.

  12. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    Science.gov (United States)

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  13. Managing the computational chemistry big data problem: the ioChem-BD platform.

    Science.gov (United States)

    Álvarez-Moreno, M; de Graaf, C; López, N; Maseras, F; Poblet, J M; Bo, C

    2015-01-26

    We present the ioChem-BD platform ( www.iochem-bd.org ) as a multiheaded tool aimed to manage large volumes of quantum chemistry results from a diverse group of already common simulation packages. The platform has an extensible structure. The key modules managing the main tasks are to (i) upload of output files from common computational chemistry packages, (ii) extract meaningful data from the results, and (iii) generate output summaries in user-friendly formats. A heavy use of the Chemical Mark-up Language (CML) is made in the intermediate files used by ioChem-BD. From them and using XSL techniques, we manipulate and transform such chemical data sets to fulfill researchers' needs in the form of HTML5 reports, supporting information, and other research media.

  14. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    Directory of Open Access Journals (Sweden)

    Leandro Marin

    2015-08-01

    Full Text Available The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  15. Out-of-hours palliative care provided by GP co-operatives: availability, content and effect of transferred information

    Directory of Open Access Journals (Sweden)

    Deliens Luc

    2009-01-01

    Full Text Available Abstract Background Out-of-hours GP care in England, Denmark and the Netherlands has been reorganised and is now provided by large scale GP co-operatives. Adequate transfer of information is necessary in order to assure continuity of care, which is of major importance in palliative care. We conducted a study to assess the availability, content and effect of information transferred to the GP co-operatives. Methods Cross-sectional exploratory study of all palliative care phone calls during a period of one year to a GP co-operative. Results The total number of phone calls about patients who needed palliative care was 0.75% of all calls to the GP co-operative. Information was transferred by GPs on 25.5% of palliative care patient calls, and on 12% of palliative care patient calls from residential care homes. For terminally ill patients the number of information transfers increased to 28.9%. When information was transferred, the content consisted mainly of clinical data. Information about the diagnosis and current problems was transferred in more than 90% of cases, information about the patient's wishes in 45% and information about the patient's psychosocial situation in 30.5% of cases. A home visit was made after 53% of the palliative care calls. When information was transferred, fewer patients were referred to a hospital. Conclusion GPs frequently fail to transfer information about their palliative care patients to the GP co-operatives. Locums working at the GP co-operative are thus required to provide palliative care in complex situations without receiving adequate information GPs should be encouraged and trained to make this information available to the GP co-operatives.

  16. Availability of information about airborne hazardous releases from animal feeding operations.

    Directory of Open Access Journals (Sweden)

    Tyler J S Smith

    Full Text Available INTRODUCTION: Air from animal feeding operations (AFOs has been shown to transport numerous contaminants of public health concern. While federal statutes like the Emergency Planning and Community Right-to-Know Act (EPCRA generally require that facilities report hazardous releases, AFOs have been exempted from most of these requirements by the U.S. Environmental Protection Agency (EPA. We assessed the availability of information about AFO airborne hazardous releases following these exemptions. METHODS: We submitted public records requests to 7 states overlapping with or adjacent to the Chesapeake Bay watershed for reports of hazardous releases made by AFOs under EPCRA. From the records received, we calculated the proportion of AFOs in each state for which ≥1 reports were available. We also determined the availability of specific types of information required under EPCRA. The numbers of AFOs permitted under the Clean Water Act (CWA or analogous state laws, as determined from permitting databases obtained from states, were used as denominators. RESULTS: We received both EPCRA reports and permitting databases from 4 of 7 states. Across these 4 states, the mean proportion of AFOs for which ≥1 EPCRA reports were available was 15% (range: 2-33%. The mean proportions of AFOs for which the name or identity of the substance released, ≥1 estimates of quantity released, and information about nearby population density and sensitive populations were available were 15% (range: 2-33%, 8% (range: 0-22%, and 14% (range: 2-8%, respectively. DISCUSSION: These results suggest that information about the airborne hazardous releases of a large majority of AFOs is not available under federal law in the states that we investigated. While the results cannot be attributed to specific factors by this method, attention to multiple factors, including revision of the EPA's exemptions, may increase the availability of information relevant to the health of populations

  17. Initial Thrust Measurements of Marshall's Ion-ioN Thruster

    Science.gov (United States)

    Caruso, Natalie R. S.; Scogin, Tyler; Liu, Thomas M.; Walker, Mitchell L. R.; Polzin, Kurt A.; Dankanich, John W.

    2015-01-01

    Electronegative ion thrusters are a variation of traditional gridded ion thruster technology differentiated by the production and acceleration of both positive and negative ions. Benefits of electronegative ion thrusters include the elimination of lifetime-limiting cathodes from the thruster architecture and the ability to generate appreciable thrust from both charge species. While much progress has been made in the development of electronegative ion thruster technology, direct thrust measurements are required to unambiguously demonstrate the efficacy of the concept and support continued development. In the present work, direct thrust measurements of the thrust produced by the MINT (Marshall's Ion-ioN Thruster) are performed using an inverted-pendulum thrust stand in the High-Power Electric Propulsion Laboratory's Vacuum Test Facility-1 at the Georgia Institute of Technology with operating pressures ranging from 4.8 x 10(exp -5) and 5.7 x 10(exp -5) torr. Thrust is recorded while operating with a propellant volumetric mixture ratio of 5:1 argon to nitrogen with total volumetric flow rates of 6, 12, and 24 sccm (0.17, 0.34, and 0.68 mg/s). Plasma is generated using a helical antenna at 13.56 MHz and radio frequency (RF) power levels of 150 and 350 W. The acceleration grid assembly is operated using both sinusoidal and square waveform biases of +/-350 V at frequencies of 4, 10, 25, 125, and 225 kHz. Thrust is recorded for two separate thruster configurations: with and without the magnetic filter. No thrust is discernable during thruster operation without the magnetic filter for any volumetric flow rate, RF forward Power level, or acceleration grid biasing scheme. For the full thruster configuration, with the magnetic filter installed, a brief burst of thrust of approximately 3.75 mN +/- 3 mN of error is observed at the start of grid operation for a volumetric flow rate of 24 sccm at 350 W RF power using a sinusoidal waveform grid bias at 125 kHz and +/- 350 V

  18. Foreign Affairs Information System (FAIS) Early Operational Capability (EOC) network security criteria

    Energy Technology Data Exchange (ETDEWEB)

    1988-09-12

    The Joint Center for Information Security Technology (JCIST) at Oak Ridge, Tennessee, under an interagency agreement between the Department of State (DOS) and the Department of Energy (DOE), has been tasked with the security certification testing of the Foreign Affairs Information system (FAIS) Early Operational Capability (EOC) software. The basis for this certification is the FAIS (EOC) Security Requirements Allocation (SRA) document. This document defines the security requirements for the FAIS EOC software. Security certification of the FAIS system is the responsibility of the Office of Information Systems Security, Bureau of Diplomatic Security (DS/ST/ISS). The overall FAIS EOC certification will be completed in two general steps. First, a test of a stand-alone FAIS EOC system against the SRA requirements which is currently in progress. Second is a test of all FAIS network system interfaces against the SRA requirements as expanded to adequately address the network security issues. This accumulation of requirements is referred to as the FAIS EOC Network Security Criteria. 5 refs.

  19. An Operational System for Estimating Road Traffic Information from Aerial Images

    Directory of Open Access Journals (Sweden)

    Jens Leitloff

    2014-11-01

    Full Text Available Given that ground stationary infrastructures for traffic monitoring are barely able to handle everyday traffic volumes, there is a risk that they could fail altogether in situations arising from mass events or disasters. In this work, we present an alternative approach for traffic monitoring during disaster and mass events, which is based on an airborne optical sensor system. With this system, optical image sequences are automatically examined on board an aircraft to estimate road traffic information, such as vehicle positions, velocities and driving directions. The traffic information, estimated in real time on board, is immediately downlinked to a ground station. The airborne sensor system consists of a three-head camera system, a real-time-capable GPS/INS unit, five industrial PCs and a downlink unit. The processing chain for automatic extraction of traffic information contains modules for the synchronization of image and navigation data streams, orthorectification and vehicle detection and tracking modules. The vehicle detector is based on a combination of AdaBoost and support vector machine classifiers. Vehicle tracking relies on shape-based matching operators. The processing chain is evaluated on a large number of image sequences recorded during several campaigns, and the data quality is compared to that obtained from induction loops. In summary, we can conclude that the achieved overall quality of the traffic data extracted by the airborne system is in the range of 68% and 81%. Thus, it is comparable to data obtained from stationary ground sensor networks.

  20. Using IoT Device Technology in Spacecraft Checkout Systems

    Science.gov (United States)

    Plummer, Chris

    2015-09-01

    The Internet of Things (IoT) has become a common theme in both the technical and popular press in recent years because many of the enabling technologies that are required to make IoT a reality have now matured. Those technologies are revolutionising the way industrial systems and products are developed because they offer significant advantages over older technologies. This paper looks at how IoT device technology can be used in spacecraft checkout systems to achieve smaller, more capable, and more scalable solutions than are currently available. It covers the use of IoT device technology for classical spacecraft test systems as well as for hardware-in-the-loop simulation systems used to support spacecraft checkout.

  1. Modeling Io's Heat Flow: Constraints from Galileo PPR Data

    Science.gov (United States)

    Rathbun, J. A.; Spencer, J. R.; Tamppari, L. K.

    2000-01-01

    We attempt to improve on previous Io heat flow estimates by using higher resolution data from Galileo Photopolarimeter Radiometer (PPR) and improved thermophysical models of the surface, including finite thermal inertia, the pedestal effect, and disk-resolved radiance.

  2. IoT Service Clustering for Dynamic Service Matchmaking

    National Research Council Canada - National Science Library

    Shuai Zhao; Le Yu; Bo Cheng; Junliang Chen

    2017-01-01

    As the adoption of service-oriented paradigms in the IoT (Internet of Things) environment, real-world devices will open their capabilities through service interfaces, which enable other functional entities to interact with them...

  3. Exploring optimal combination of a file system and an I/O scheduler for underlying solid state disks

    Institute of Scientific and Technical Information of China (English)

    Hui SUN; Xiao QIN; Chang-sheng XIE

    2014-01-01

    Performance and energy consumption of a solid state disk (SSD) highly depend on fi le systems and I/O schedulers in operating systems. To fi nd an optimal combination of a fi le system and an I/O scheduler for SSDs, we use a metric called the aggregative indicator (AI), which is the ratio of SSD performance value (e.g., data transfer rate in MB/s or throughput in IOPS) to that of energy consumption for an SSD. This metric aims to evaluate SSD performance per energy consumption and to study the SSD which delivers high performance at low energy consumption in a combination of a fi le system and an I/O scheduler. We also propose a metric called Cemp to study the changes of energy consumption and mean performance for an Intel SSD (SSD-I) when it provides the largest AI, lowest power, and highest performance, respectively. Using Cemp, we attempt to fi nd the combination of a fi le system and an I/O scheduler to make SSD-I deliver a smooth change in energy consumption. We employ Filebench as a workload generator to simulate a wide range of workloads (i.e., varmail, fi leserver, and webserver), and explore optimal combinations of fi le systems and I/O schedulers (i.e., optimal values of AI) for tested SSDs under different workloads. Experimental results reveal that the proposed aggregative indicator is comprehensive for exploring the optimal combination of a fi le system and an I/O scheduler for SSDs, compared with an individual metric.

  4. Mountain building on Io driven by deep faulting

    Science.gov (United States)

    Bland, Michael; McKinnon, William B

    2016-01-01

    Jupiter’s volcanic moon Io possesses some of the highest relief in the Solar System: massive, isolated mountain blocks that tower up to 17 km above the surrounding plains. These mountains are likely to result from pervasive compressive stresses induced by subsidence of the surface beneath the near-continual emplacement of volcanic material. The stress state that results from subsidence and warming of Io’s lithosphere has been investigated in detail1, 2, 3, 4; however, the mechanism of orogenesis itself and its effect on regional tectonism and volcanism has not been firmly established. Here we present viscoelastic–plastic finite element simulations demonstrating that Io’s mountains form along deep-seated thrust faults that initiate at the base of the lithosphere and propagate upward. We show that faulting fundamentally alters the stress state of Io’s lithosphere by relieving the large volcanism-induced subsidence stresses. Notably, in the upper portion of the lithosphere, stresses become tensile (near-zero differential stress). A number of processes are therefore altered post-faulting, including magma transport through the lithosphere, interactions with tidal stresses and potentially the localization of mountain formation by thermoelastic stresses. We conclude that Io’s mountains form by a unique orogenic mechanism, compared with tectonic processes operating elsewhere in the Solar System.

  5. Integrating Facebook iOS SDK with your application

    CERN Document Server

    Macrì, Giuseppe

    2013-01-01

    A tutorial-based guide with chapters focusing on learning and embedding crucial Facebook features.If you are a developer who wishes to develop and monetize your apps on the App store, then this is the book for you. This book assumes you have basic knowledge of iOS programming using Objective-C and XCode, however, prior knowledge of Facebook iOS SDK is not required.

  6. Practical comparison of distributed ledger technologies for IoT

    Science.gov (United States)

    Red, Val A.

    2017-05-01

    Existing distributed ledger implementations - specifically, several blockchain implementations - embody a cacophony of divergent capabilities augmenting innovations of cryptographic hashes, consensus mechanisms, and asymmetric cryptography in a wide variety of applications. Whether specifically designed for cryptocurrency or otherwise, several distributed ledgers rely upon modular mechanisms such as consensus or smart contracts. These components, however, can vary substantially among implementations; differences involving proof-of-work, practical byzantine fault tolerance, and other consensus approaches exemplify distinct distributed ledger variations. Such divergence results in unique combinations of modules, performance, latency, and fault tolerance. As implementations continue to develop rapidly due to the emerging nature of blockchain technologies, this paper encapsulates a snapshot of sensor and internet of things (IoT) specific implementations of blockchain as of the end of 2016. Several technical risks and divergent approaches preclude standardization of a blockchain for sensors and IoT in the foreseeable future; such issues will be assessed alongside the practicality of IoT applications among Hyperledger, Iota, and Ethereum distributed ledger implementations suggested for IoT. This paper contributes a comparison of existing distributed ledger implementations intended for practical sensor and IoT utilization. A baseline for characterizing distributed ledger implementations in the context of IoT and sensors is proposed. Technical approaches and performance are compared considering IoT size, weight, and power limitations. Consensus and smart contracts, if applied, are also analyzed for the respective implementations' practicality and security. Overall, the maturity of distributed ledgers with respect to sensor and IoT applicability will be analyzed for enterprise interoperability.

  7. A Systemic Approach for IoT Security

    OpenAIRE

    Riahi, Arbia; Challal, Yacine; Natalizio, Enrico; Chtourou, Zied; Bouabdallah, Abdelmadjid

    2013-01-01

    International audience; In this paper we want to explore a new approach for security mechanisms design and deployment in the context of Internet of Things (IoT). We claim that the usual approach to security issues, typical of more classical systems and networks, does not grab all the aspects related to this new paradigm of communication, sharing and actuation. In fact, the IoT paradigm involves new features, mechanisms and dangers that cannot be completely taken into consideration through the...

  8. Current parallel I/O limitations to scalable data analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Mascarenhas, Ajith Arthur; Pebay, Philippe Pierre

    2011-07-01

    This report describes the limitations to parallel scalability which we have encountered when applying our otherwise optimally scalable parallel statistical analysis tool kit to large data sets distributed across the parallel file system of the current premier DOE computational facility. This report describes our study to evaluate the effect of parallel I/O on the overall scalability of a parallel data analysis pipeline using our scalable parallel statistics tool kit [PTBM11]. In this goal, we tested it using the Jaguar-pf DOE/ORNL peta-scale platform on a large combustion simulation data under a variety of process counts and domain decompositions scenarios. In this report we have recalled the foundations of the parallel statistical analysis tool kit which we have designed and implemented, with the specific double intent of reproducing typical data analysis workflows, and achieving optimal design for scalable parallel implementations. We have briefly reviewed those earlier results and publications which allow us to conclude that we have achieved both goals. However, in this report we have further established that, when used in conjuction with a state-of-the-art parallel I/O system, as can be found on the premier DOE peta-scale platform, the scaling properties of the overall analysis pipeline comprising parallel data access routines degrade rapidly. This finding is problematic and must be addressed if peta-scale data analysis is to be made scalable, or even possible. In order to attempt to address these parallel I/O limitations, we will investigate the use the Adaptable IO System (ADIOS) [LZL+10] to improve I/O performance, while maintaining flexibility for a variety of IO options, such MPI IO, POSIX IO. This system is developed at ORNL and other collaborating institutions, and is being tested extensively on Jaguar-pf. Simulation code being developed on these systems will also use ADIOS to output the data thereby making it easier for other systems, such as ours, to

  9. A post-Galileo view of Io's interior

    Science.gov (United States)

    Keszthelyi, L.; Jaeger, W.L.; Turtle, E.P.; Milazzo, M.; Radebaugh, J.

    2004-01-01

    We present a self-consistent model for the interior of Io, taking the recent Galileo data into account. In this model, Io has a completely molten core, substantially molten mantle, and a very cold lithosphere. Heat from magmatic activity can mobilize volatile compounds such as SO2 in the lithosphere, and the movement of such cryogenic fluids may be important in the formation of surface features including sapping scarps and paterae. ?? Published by Elsevier Inc.

  10. S 2O, polysulfuroxide and sulfur polymer on Io's surface?

    Science.gov (United States)

    Baklouti, Donia; Schmitt, Bernard; Brissaud, Olivier

    2008-04-01

    To settle the question of disulfur monoxide and sulfur monoxide deposition and occurrence on Io's surface, we performed series of laboratory experiments reproducing the condensation of S 2O at low temperature. Its polymerization has been monitored by recording infrared spectra under conditions of temperature, pressure, mixing with SO 2 and UV-visible radiation simulating that of Io's surface. Our experiments show that S 2O condensates are not chemically stable under ionian conditions. We also demonstrate that SO and S 2O outgassed by Io's volcanoes and condensing on Io's surface should lead to yellow polysulfuroxide deposits or to white deposits of S 2O diluted in sulfur dioxide frost (i.e., S 2O/SO 2 < 0.1%). Thus S 2O condensation cannot be responsible for the red volcanic deposits on Io. Comparison of the laboratory infrared spectra of S 2O and polysulfuroxide with NIMS/Galileo infrared spectra of Io's surface leads us to discuss the possible identification of polysulfuroxide. We also recorded the visible transmission spectra of sulfur samples resulting from polysulfuroxide decomposition. These samples consist in a mixture of sulfur polymer and orthorhombic sulfur. Using the optical constants extracted from these measurements, we show that a linear combination of the reflectance spectra of our samples, the reflectance spectrum of orthorhombic S 8 sulfur and SO 2 reflectance spectrum, leads to a very good matching of Io's visible spectrum between 330 and 520 nm. We conclude then that Io's surface is probably mainly composed of sulfur dioxide and a mixture of sulfur S 8 and sulfur polymer. Some polysulfuroxide could also co-exist with these dominant components, but is probably restricted to some volcanic areas.

  11. DSMC simulation of Io's unsteady Tvashtar plume

    Science.gov (United States)

    Hoey, W. A.; Ackley, P. C.; Trafton, L. M.; Goldstein, D. B.; Varghese, P. L.

    2016-11-01

    Jupiter's moon Io supports its rarefied atmosphere with prolific tidally-driven episodic volcanism. Its largest volcanic plumes erupt violently and exhibit intricate structure, their canopies rising to hundreds of km above the Ionian surface. In early 2007, the NASA New Horizons (NH) spacecraft captured the active Tvashtar plume in a time sequence of panchromatic images at high spatial resolution and observed both discrete "filamentary" patterns in the descending particulate structure, and a prominent traveling canopy wave. These are transient and asymmetric features, indicative of Tvashtar's unresolved and complex vent processes. In this work, we introduce a methodology for identifying vent spatial and temporal scales in the rarefied plume. Three-dimensional DSMC simulations of the collisional gas flowfield are combined with a flow-tracking dust particle model, enabling a broad exploration of parameter space in pursuit of the critical frequencies that qualitatively reproduce the dynamical phenomena observed in Tvashtar's collisional canopy and providing insight into the dynamics of transient extra-terrestrial volcanic plumes.

  12. Performance Evaluations for IEEE 802.15.4-based IoT Smart Home Solution

    Directory of Open Access Journals (Sweden)

    Nga Dinh

    2016-09-01

    Full Text Available The Internet of Things (IoT is going to be a market-changing force for a variety of real-time applications such as e-healthcare, home automation, environmental monitoring, and industrial automation. Low power wireless communication protocols offering long lifetime and high reliability such as the IEEE 802.15.4 standard have been a key enabling technology for IoT deployments and are deployed for home automation recently. The issues of the IEEE 802.15.4 networks have moved from theory to real world deployments. The work presented herein intends to demonstrate the use of the IEEE 802.15.4 standard in recent IoT commercial products for smart home applications: the Smart Home Starter Kit. The contributions of the paper are twofold. First, the paper presents how the IEEE 802.15.4 standard is employed in Smart Home Starter Kit. In particular, network topology, network operations, and data transfer mode are investigated. Second, network performance metrics such as end-to-end (E2E delay and frame reception ratio (FRR are evaluated by experiments. In addition, the paper discusses several directions for future improvements of home automation commercial products.

  13. An IoT System for Remote Monitoring of Patients at Home

    Directory of Open Access Journals (Sweden)

    KeeHyun Park

    2017-03-01

    Full Text Available Application areas that utilize the concept of IoT can be broadened to healthcare or remote monitoring areas. In this paper, a remote monitoring system for patients at home in IoT environments is proposed, constructed, and evaluated through several experiments. To make it operable in IoT environments, a protocol conversion scheme between ISO/IEEE 11073 protocol and oneM2M protocol, and a Multiclass Q-learning scheduling algorithm based on the urgency of biomedical data delivery to medical staff are proposed. In addition, for the sake of patients’ privacy, two security schemes are proposed—the separate storage scheme of data in parts and the Buddy-ACK authorization scheme. The experiment on the constructed system showed that the system worked well and the Multiclass Q-learning scheduling algorithm performs better than the Multiclass Based Dynamic Priority scheduling algorithm. We also found that the throughputs of the Multiclass Q-learning scheduling algorithm increase almost linearly as the measurement time increases, whereas the throughputs of the Multiclass Based Dynamic Priority algorithm increase with decreases in the increasing ratio.

  14. Real-Time Traffic Information for Emergency Evacuation Operations: Phase A Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Franzese, Oscar [ORNL; Zhang, Li [Mississippi State University (MSU); Mahmoud, Anas M. [Mississippi State University (MSU); Lascurain, Mary Beth [ORNL; Wen, Yi [Mississippi State University (MSU)

    2010-05-01

    There are many instances in which it is possible to plan ahead for an emergency evacuation (e.g., an explosion at a chemical processing facility). For those cases, if an accident (or an attack) were to happen, then the best evacuation plan for the prevailing network and weather conditions would be deployed. In other cases (e.g., the derailment of a train transporting hazardous materials), there may not be any previously developed plan to be implemented and decisions must be made ad-hoc on how to proceed with an emergency evacuation. In both situations, the availability of real-time traffic information plays a critical role in the management of the evacuation operations. To improve public safety during a vehicular emergency evacuation it is necessary to detect losses of road capacity (due to incidents, for example) as early as possible. Once these bottlenecks are identified, re-routing strategies must be determined in real-time and deployed in the field to help dissipate the congestion and increase the efficiency of the evacuation. Due to cost constraints, only large urban areas have traffic sensor deployments that permit access to some sort of real-time traffic information; any evacuation taking place in any other areas of the country would have to proceed without real-time traffic information. The latter was the focus of this SERRI/DHS (Southeast Region Research Initiative/Department of Homeland Security) sponsored project. That is, the main objective on the project was to improve the operations during a vehicular emergency evacuation anywhere by using newly developed real-time traffic-information-gathering technologies to assess traffic conditions and therefore to potentially detect incidents on the main evacuation routes. Phase A of the project consisted in the development and testing of a prototype system composed of sensors that are engineered in such a way that they can be rapidly deployed in the field where and when they are needed. Each one of these sensors

  15. Pianola: A script-based I/O benchmark

    Energy Technology Data Exchange (ETDEWEB)

    May, J

    2008-09-18

    Script-based I/O benchmarks record the I/O behavior of applications by using an instrumentation library to trace I/O events and their timing. A replay engine can then reproduce these events from the script in the absence of the original application. This type of benchmark reproduces real-world I/O workloads without the need to distribute, build, or run complex applications. However, faithfully recreating the I/O behavior of the original application requires careful design in both the instrumentation library and the replay engine. This paper presents the Pianola script-based benchmarking system, which includes an accurate and unobtrusive instrumentation system and a simple-to-use replay engine, along with some additional utility programs to manage the creation and replay of scripts. We show that for some sample applications, Pianola reproduces the qualitative features of the I/O behavior. Moreover, the overall replay time and the cumulative read and write times are usually within 10% of the values measured for the original applications.

  16. TRIO: Burst Buffer Based I/O Orchestration

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Teng [Auburn University; Oral, H Sarp [ORNL; Pritchard, Michael [Auburn University; Wang, Bin [Auburn University; Yu, Weikuan [Auburn University

    2015-01-01

    The growing computing power on leadership HPC systems is often accompanied by ever-escalating failure rates. Checkpointing is a common defensive mechanism used by scientific applications for failure recovery. However, directly writing the large and bursty checkpointing dataset to parallel filesystem can incur significant I/O contention on storage servers. Such contention in turn degrades the raw bandwidth utilization of storage servers and prolongs the average job I/O time of concurrent applications. Recently burst buffer has been proposed as an intermediate layer to absorb the bursty I/O traffic from compute nodes to storage backend. But an I/O orchestration mechanism is still desired to efficiently move checkpointing data from bursty buffers to storage backend. In this paper, we propose a burst buffer based I/O orchestration framework, named TRIO, to intercept and reshape the bursty writes for better sequential write traffic to storage severs. Meanwhile, TRIO coordinates the flushing orders among concurrent burst buffers to alleviate the contention on storage server bandwidth. Our experimental results reveal that TRIO can deliver 30.5% higher bandwidth and reduce the average job I/O time by 37% on average for data-intensive applications in various checkpointing scenarios.

  17. Pianola: A script-based I/O benchmark

    Energy Technology Data Exchange (ETDEWEB)

    May, J

    2008-09-18

    Script-based I/O benchmarks record the I/O behavior of applications by using an instrumentation library to trace I/O events and their timing. A replay engine can then reproduce these events from the script in the absence of the original application. This type of benchmark reproduces real-world I/O workloads without the need to distribute, build, or run complex applications. However, faithfully recreating the I/O behavior of the original application requires careful design in both the instrumentation library and the replay engine. This paper presents the Pianola script-based benchmarking system, which includes an accurate and unobtrusive instrumentation system and a simple-to-use replay engine, along with some additional utility programs to manage the creation and replay of scripts. We show that for some sample applications, Pianola reproduces the qualitative features of the I/O behavior. Moreover, the overall replay time and the cumulative read and write times are usually within 10% of the values measured for the original applications.

  18. Modern technologies for rendering information support to cogeneration steam turbine units in their design and operation stages

    Science.gov (United States)

    Brezgin, V. I.; Brodov, Yu. M.; Chubarov, A. A.; Brezgin, D. V.

    2013-08-01

    Application of modern information technologies in different stages of the lifecycle of cogeneration turbines is considered as one of possible ways for improving their competitiveness. Specific features relating to rendering information support for steam turbine units during the periods of their design and operation, which are the main stages of their life cycle, are presented. Three-dimension modeling, adaptive, and parametric design technologies are applied in the equipment design stages. Information support technologies developed by the authors are applied during the operation stage. Information is integrated by using a product lifecycle management (PLM) system.

  19. IoSiS: a radar system for imaging of satellites in space

    Science.gov (United States)

    Jirousek, M.; Anger, S.; Dill, S.; Schreiber, E.; Peichl, M.

    2017-05-01

    Space debris nowadays is one of the main threats for satellite systems especially in low earth orbit (LEO). More than 700,000 debris objects with potential to destroy or damage a satellite are estimated. The effects of an impact often are not identifiable directly from ground. High-resolution radar images are helpful in analyzing a possible damage. Therefor DLR is currently developing a radar system called IoSiS (Imaging of Satellites in Space), being based on an existing steering antenna structure and our multi-purpose high-performance radar system GigaRad for experimental investigations. GigaRad is a multi-channel system operating at X band and using a bandwidth of up to 4.4 GHz in the IoSiS configuration, providing fully separated transmit (TX) and receive (RX) channels, and separated antennas. For the observation of small satellites or space debris a highpower traveling-wave-tube amplifier (TWTA) is mounted close to the TX antenna feed. For the experimental phase IoSiS uses a 9 m TX and a 1 m RX antenna mounted on a common steerable positioner. High-resolution radar images are obtained by using Inverse Synthetic Aperture Radar (ISAR) techniques. The guided tracking of known objects during overpass allows here wide azimuth observation angles. Thus high azimuth resolution comparable to the range resolution can be achieved. This paper outlines technical main characteristics of the IoSiS radar system including the basic setup of the antenna, the radar instrument with the RF error correction, and the measurement strategy. Also a short description about a simulation tool for the whole instrument and expected images is shown.

  20. Holographic mutual information and distinguishability of Wilson loop and defect operators

    CERN Document Server

    Hartnoll, Sean A

    2014-01-01

    The mutual information of disconnected regions in large $N$ gauge theories with holographic gravity duals can undergo phase transitions. These occur when connected and disconnected bulk Ryu-Takayanagi surfaces exchange dominance. That is, the bulk `soap bubble' snaps as the boundary regions are drawn apart. We give a gauge-theoretic characterization of this transition: States with and without a certain defect operator insertion -- the defect separates the entangled spatial regions -- are shown to be perfectly distinguishable if and only if the Ryu-Takayanagi surface is connected. Meanwhile, states with and without a certain Wilson loop insertion -- the Wilson loop nontrivially threads the spatial regions -- are perfectly distinguishable if and only if the Ryu-Takayanagi surface is disconnected. The quantum relative entropy of two perfectly distinguishable states is infinite. The results are obtained by relating the soap bubble transition to Hawking-Page (deconfinement) transitions in the Renyi entropies, wher...

  1. A Computer-aided Application for Modeling and Monitoring Operational and Maintenance Information in Mining Trucks

    Science.gov (United States)

    Nikulin, Christopher; Ulloa, Andres; Carmona, Carlos; Creixell, Werner

    2016-09-01

    The combination of maintenance planning and key performance indicators are relevant to create a more holistic scenario of the mining activities. On the one hand, reliability and maintainability are system characteristics suitable for planning maintenance strategies. On the other hand, key performance indicators are suitable to analyze cost and resource consumption information about mining equipment. Nevertheless in practice, both approaches are modeled separately and frequently by different team-works of a mining company. With this in mind, a computer-aided application was conceived to drive with better efficacy the operational and maintenance strategy in a complex process where the equipment is in continuous movement such as the transportation process in an open-mine pit.

  2. Impact of computerized information systems on workload in operating room and intensive care unit.

    Science.gov (United States)

    Bosman, R J

    2009-03-01

    The number of operating rooms and intensive care departments equipped with a clinical information system (CIS) is rapidly expanding. Amongst the putative advantages of such an installation, reduction in workload for the clinician is one of the most appealing. The scarce studies looking at workload variations associated with the implementation of a CIS, only focus on direct workload discarding indirect changes in workload. Descriptions of the various methods to quantify workload are provided. The hypothesis that a third generation CIS can reduce documentation time for ICU nurses and increase time they spend on patient care, is supported by recent literature. Though it seems obvious to extrapolate these advantages of a CIS to the anesthesiology department or physicians in the intensive care, studies examining this assumption are scarce.

  3. How Operations in Haiti and Japan Informed Joint Publication 3-08: The Future of Interorganizational Operations?

    Science.gov (United States)

    2013-05-23

    Assistance, Japan Earthquake and Tsunami Update ( Tripler Army Medical Center, Hawaii, 2011), 42. 51Karl C. Rohr, Operation Tomodachi: After Action...Humanitarian Assistance. Japan Earthquake and Tsunami Update. Tripler Army Medical Center, Hawaii, 2011. Central Intelligence Agency, "CIA Fact Book" https

  4. On Stability of Open-Loop Operation without Rotor Information for Brushless DC Motors

    Directory of Open Access Journals (Sweden)

    Zhong Wu

    2014-01-01

    Full Text Available Open-loop operation mode is often used to control the Brushless DC Motors (BLDCMs without rotor position sensors when the back electromotive force (EMF is too weak due to the very low rotor velocity. The rotor position information is not necessary in this mode and the stator windings are supplied with voltages under a certain ratio of the amplitude to the frequency. However, the rotor synchronization will be destroyed once if the commutation instant is inappropriate. In order to improve the reliability of the open-loop operation mode, a dynamic equation is established to represent the synchronization error between the rotor and the stator. Thereafter, the stability of the open-loop control mode is analyzed by using Lyapunov indirect method. Theoretical analysis indicates that the open-loop control mode is asymptotically stable only when the commutation instant of the stator current lags behind the ideal one suitably. Finally, theoretical analysis is verified through the experimental results of a certain BLDCM.

  5. Holographic mutual information and distinguishability of Wilson loop and defect operators

    Energy Technology Data Exchange (ETDEWEB)

    Hartnoll, Sean A.; Mahajan, Raghu [Department of Physics, Stanford University, Stanford, CA 94305-4060 (United States)

    2015-02-16

    The mutual information of disconnected regions in large N gauge theories with holographic gravity duals can undergo phase transitions. These occur when connected and disconnected bulk Ryu-Takayanagi surfaces exchange dominance. That is, the bulk ‘soap bubble’ snaps as the boundary regions are drawn apart. We give a gauge-theoretic characterization of this transition: States with and without a certain defect operator insertion — the defect separates the entangled spatial regions — are shown to be perfectly distinguishable if and only if the Ryu-Takayanagi surface is connected. Meanwhile, states with and without a certain Wilson loop insertion — the Wilson loop nontrivially threads the spatial regions — are perfectly distinguishable if and only if the Ryu-Takayanagi surface is disconnected. The quantum relative entropy of two perfectly distinguishable states is infinite. The results are obtained by relating the soap bubble transition to Hawking-Page (deconfinement) transitions in the Rényi entropies, where defect operators and Wilson loops are known to act as order parameters.

  6. The Use of Information and Communication Technologies (ICT in Front Office Operations of Chain Hotels in Ghana

    Directory of Open Access Journals (Sweden)

    Albert Kwansah Ansah

    2012-03-01

    Full Text Available The proliferation of Information and Communication Technologies (ICT coupled with sophisticated network protocols have unveiled new avenues for enterprises and organizations and the hospitality industries cannot be left out. Technology-based systems stand in a pivotal position to offer better service to the populace. Hospitality industries such as hotels can take advantage of the pervasiveness of ICT vis-à-vis technology-based systems to advance some of their operations. This paper seeks to assess the use of Information and Communication Technologies (ICT in a front office operation of chain hotels in Ghana. The paper determines the extent of the use of information technology in a front office operation of chain hotels in Ghana. The paper continues to assess the effect of the use of information technology in the front office operation of chain hotels in Ghana, thus if the use of ICT has any effect on chain hotels’ front office operations. The paper further makes recommendations to chain hotel operators and the Ghana Tourist Authority (GTA and policy makers on the use of information and communications technology in front office operation in chain hotels. Three chain hotels in Ghana were assessed

  7. 78 FR 68082 - Information Collection Activities: Oil and Gas Well-Workover Operations; Submitted for Office of...

    Science.gov (United States)

    2013-11-13

    ... INFORMATION: Title: 30 CFR Part 250, Subpart F, Oil and Gas Well-Workover Operations. OMB Control Number: 1014... Burden covered under 1014-0018. 0 begin subsea well- workover operations; submit Forms BSEE-0124 (include... and equivalent well-control fluid volume. Subtotal 306 responses...... 230...

  8. 17 CFR 249.821 - Form PILOT, information required of self-regulatory organizations operating pilot trading systems...

    Science.gov (United States)

    2010-04-01

    ... required of self-regulatory organizations operating pilot trading systems pursuant to § 240.19b-5 of this... Associations § 249.821 Form PILOT, information required of self-regulatory organizations operating pilot trading systems pursuant to § 240.19b-5 of this chapter. This form shall be used by all...

  9. Application of Majoritarian Element to Improve IoT Communication

    Directory of Open Access Journals (Sweden)

    Tornike Dvali

    2016-06-01

    Full Text Available The work introduces the circle of the basic ideas and methods of error-free recovery of the binary signal to the multichannel digital technology based on the model of formal (artificial neuron and aims to contribute to the further development of this theo-ry of reliability. The work is useful for reservation or for exchange of a highly valuable information. During communication be-tween machines, connection related problems could occur and this work will be of a great help for machines to choose right channel for connection. Work also is a successful attempt of figuring out binary signal error recovery probability of minimum highest value. Moreover, binary channels optimization problems addressed by using threshold model and exploring three differ-ent approaches. In the future, this work will be used in Internet of Things (IoT for the exact communication between machines. Work will be used with threshold model for minimizing errors in the communication between things.

  10. Complex IoT Systems as Enablers for Smart Homes in a Smart City Vision.

    Science.gov (United States)

    Lynggaard, Per; Skouby, Knud Erik

    2016-11-02

    The world is entering a new era, where Internet-of-Things (IoT), smart homes, and smart cities will play an important role in meeting the so-called big challenges. In the near future, it is foreseen that the majority of the world's population will live their lives in smart homes and in smart cities. To deal with these challenges, to support a sustainable urban development, and to improve the quality of life for citizens, a multi-disciplinary approach is needed. It seems evident, however, that a new, advanced Information and Communications Technology ICT infrastructure is a key feature to realize the "smart" vision. This paper proposes a specific solution in the form of a hierarchical layered ICT based infrastructure that handles ICT issues related to the "big challenges" and seamlessly integrates IoT, smart homes, and smart city structures into one coherent unit. To exemplify benefits of this infrastructure, a complex IoT system has been deployed, simulated and elaborated. This simulation deals with wastewater energy harvesting from smart buildings located in a smart city context. From the simulations, it has been found that the proposed infrastructure is able to harvest between 50% and 75% of the wastewater energy in a smart residential building. By letting the smart city infrastructure coordinate and control the harvest time and duration, it is possible to achieve considerable energy savings in the smart homes, and it is possible to reduce the peak-load for district heating plants.

  11. Data-Filtering System to Avoid Total Data Distortion in IoT Networking

    Directory of Open Access Journals (Sweden)

    Dae-Young Kim

    2017-01-01

    Full Text Available In the Internet of Things (IoT networking, numerous objects are connected to a network. They sense events and deliver the sensed information to the cloud. A lot of data is generated in the IoT network, and servers in the cloud gather the sensed data from the objects. Then, the servers analyze the collected data and provide proper intelligent services to users through the results of the analysis. When the server analyzes the collected data, if there exists malfunctioning data, distortional results of the analysis will be generated. The distortional results lead to misdirection of the intelligent services, leading to poor user experience. In the analysis for intelligent services in IoT, malfunctioning data should be avoided because integrity of the collected data is crucial. Therefore, this paper proposes a data-filtering system for the server in the cloud. The proposed data-filtering system is placed in front of the server and firstly receives the sensed data from the objects. It employs the naïve Bayesian classifier and, by learning, classifies the malfunctioning data from among the collected data. Data with integrity is delivered to the server for analysis. Because the proposed system filters the malfunctioning data, the server can obtain accurate analysis results and reduce computing load. The performance of the proposed data-filtering system is evaluated through computer simulation. Through the simulation results, the efficiency of the proposed data-filtering system is shown.

  12. A study of IOS data using the aRIC+I(p) model of respiratory impedance.

    Science.gov (United States)

    Nguyen, T-U; Diong, B; Goldman, M

    2009-01-01

    Development of better methods to assess human lung function has been continuing since the existing standard lung function test of spirometry requires subjects to inhale and exhale with maximum effort, which may be troublesome especially for the elderly and young children, leading to unreliable results. Therefore, the method of forced oscillation, and the Impulse Oscillometry System (IOS) in particular, has been developed to lessen the effort of the patients while obtaining valid measurements. The applied pressure waves and the resulting airflow responses are recorded to provide information about the respiratory system's input impedance, which can be fit by electric circuit models to possibly serve as a means to detect and diagnose respiratory diseases. Presently, research continues to find a more accurate model that also provides reasonable component values. This paper proposes the augmented RIC+I(p)(aRIC+I(p)) model and compares it to five other well-known models (the RIC, extended RIC, augmented RIC, DuBois and Mead models) in fitting the IOS data from adult COPD patients and healthy subjects. While the aRIC+I(p) model yielded slightly higher fitting error than the Mead and DuBois models, it did not produce unphysiologically large values for any of its components, unlike the Mead and DuBois models. Hence, the aRIC+(p) model appears to be the most reasonable one for use, at this point in time, in studying IOS-based computer-aided detection and diagnosis of COPD.

  13. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jin-Xin Hu

    2017-01-01

    Full Text Available Internet of Things (IoT is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly’s privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.

  14. Robust High-dimensional Bioinformatics Data Streams Mining by ODR-ioVFDT

    Science.gov (United States)

    Wang, Dantong; Fong, Simon; Wong, Raymond K.; Mohammed, Sabah; Fiaidhi, Jinan; Wong, Kelvin K. L.

    2017-01-01

    Outlier detection in bioinformatics data streaming mining has received significant attention by research communities in recent years. The problems of how to distinguish noise from an exception and deciding whether to discard it or to devise an extra decision path for accommodating it are causing dilemma. In this paper, we propose a novel algorithm called ODR with incrementally Optimized Very Fast Decision Tree (ODR-ioVFDT) for taking care of outliers in the progress of continuous data learning. By using an adaptive interquartile-range based identification method, a tolerance threshold is set. It is then used to judge if a data of exceptional value should be included for training or otherwise. This is different from the traditional outlier detection/removal approaches which are two separate steps in processing through the data. The proposed algorithm is tested using datasets of five bioinformatics scenarios and comparing the performance of our model and other ones without ODR. The results show that ODR-ioVFDT has better performance in classification accuracy, kappa statistics, and time consumption. The ODR-ioVFDT applied onto bioinformatics streaming data processing for detecting and quantifying the information of life phenomena, states, characters, variables and components of the organism can help to diagnose and treat disease more effectively. PMID:28230161

  15. Undergraduates Learn about Industrial-Organizational Psychology and Human Factors from an Informational Brochure

    Science.gov (United States)

    Kottke, Janet L.; Shoenfelt, Elizabeth L.; Stone, Nancy J.

    2017-01-01

    An informational brochure was created to assist students and faculty unfamiliar with the industrial-organizational (IO) and human factors (HF) disciplines. The brochure highlights the content of these two professions, presents advice for undergraduates to prepare for admission to IO and HF graduate programs, provides sources of IO and HF…

  16. Undergraduates Learn about Industrial-Organizational Psychology and Human Factors from an Informational Brochure

    Science.gov (United States)

    Kottke, Janet L.; Shoenfelt, Elizabeth L.; Stone, Nancy J.

    2017-01-01

    An informational brochure was created to assist students and faculty unfamiliar with the industrial-organizational (IO) and human factors (HF) disciplines. The brochure highlights the content of these two professions, presents advice for undergraduates to prepare for admission to IO and HF graduate programs, provides sources of IO and HF…

  17. Improving safety, health and the working environment in the informal footwear sector : PATRIS operator's manual (Participatory Action Training for Informal Sector Operators)

    OpenAIRE

    2003-01-01

    Focuses on workplace hazards, preventive measures and day-to-day management practices relevant to informal shoe workshops. Presents practical low-cost and locally-identified measures to improve working conditions.

  18. 77 FR 60685 - Proposed Extension of Approval of Information Collection; Comment Request-Electrically Operated...

    Science.gov (United States)

    2012-10-04

    ....regulations.gov . FOR FURTHER INFORMATION CONTACT: For further information contact: Robert H. Squibb, Consumer... information technology. Dated: October 1, 2012. Todd A. Stevenson, Secretary, Consumer Product...

  19. Spatial distribution of Io's volcanic activity from near-IR adaptive optics observations on 100 nights in 2013-2015

    Science.gov (United States)

    de Kleer, Katherine; de Pater, Imke

    2016-12-01

    The extreme and time-variable volcanic activity on Jupiter's moon Io is the result of periodic tidal forcing. The spatial distribution of Io's surface heat flux provides an important constraint on models for tidal heat dissipation, yielding information on interior properties and on the depth at which the tidal heat is primarily dissipated. We analyze the spatial distribution of 48 hot spots based on more than 400 total hot spot detections in adaptive optics images taken on 100 nights in 2013-2015 (data presented in de Kleer and de Pater [2016] Time variability of Io's volcanic activity from near-IR adaptive optics 13 observations on 100 nights in 2013-2015). We present full surface maps of Io at multiple near-infrared wavelengths for three epochs during this time period, and show that the longitudinal distribution of hot spots has not changed significantly since the Galileo mission. We find that hot spots that are persistently active at moderate intensities tend to occur at different latitudes/longitudes than those that exhibit sudden brightening events characterized by high peak intensities and subsequent decay phases. While persistent hot spots are located primarily between ± 30°N, hot spots exhibiting bright eruption events occur primarily between 40° and 65° in both the northern and southern hemispheres. In addition, while persistent hot spots occur preferentially on the leading hemisphere, all bright eruptions were detected on the trailing hemisphere, despite the comparable longitudinal coverage of our observations to both hemispheres. A subset of the bright hot spots which are not intense enough to qualify as outburst eruptions resemble outbursts in terms of temporal evolution and spatial distribution, and may be outbursts whose peak emission went unobserved, or else scaled-down versions of the same phenomenon. A statistical analysis finds that large eruptions are more spatially clustered and occur at higher latitudes than 95% of simulated datasets that

  20. Before Putting Mouth (and Operation) in Gear, Ensure Brain is Engaged: The importance of Communication and Information in Military Operations

    Science.gov (United States)

    2009-06-01

    public relations, marketing , and advertising works to help round out the ideas of the information component. 2 For the purpose of this thesis...Hue south of the Perfume River. In strategic terms, Charlie’s cut the country in half... the civilian press are about to wet their pants and we’ve

  1. Variability and Composition of Io's Pele Plume

    Science.gov (United States)

    Jessup, K. L.; Spencer, J.; Yelle, R.

    2004-11-01

    The Pele plume is one of the largest and most dynamic of the plumes on Io. While sulfur dioxide (SO2) gas was always assumed to be a constituent of this plume, spectral observations obtained in 1999 were the first to positively identify elemental sulfur (S2) (Spencer et al. 2000) within the Pele plume. The S2/SO2 ratio derived from this observation provided a critical component necessary for the constraint of the magma chemistry and vent conditions of the Pele plume (Zolotov and Fegley 1998). But, because the Pele plume has long been known to be variable in its eruptive behavior, it is not likely that the vent conditions are invariant. Consequently, additional observations were needed to constrain the extent of the variability of the plume's composition and gas abundances. To this end, in February 2003, March 2003 and January 2004 we obtained spectra of Pele with Hubble's Space Telescope Imaging Spectrograph (STIS) in transit of Jupiter, using the 0.1 arcsec slit, for the wavelength region extending from 2100-3100 Å. Contemporaneous with the spectral data we also obtained UV and visible-wavelength images of the plume in reflected sunlight with the Advanced Camera for Surveys (ACS) prior to Jupiter transit, in order to constrain plume dust abundance. The newly acquired STIS data show both the S2 and SO2 absorption signatures, and provide concrete evidence of temporal variability in the abundance of these gases. Likewise, the degree of dust scattering recorded in the ACS data varied as a function of the date of observation. We will present preliminary constraints on the composition and variability of the gas abundances of the Pele plume as recorded within the STIS data. We will also give a brief overview of the variability of the plume dust signatures relative to the gas signatures as a function of time.

  2. Quantum computing accelerator I/O : LDRD 52750 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Schroeppel, Richard Crabtree; Modine, Normand Arthur; Ganti, Anand; Pierson, Lyndon George; Tigges, Christopher P.

    2003-12-01

    In a superposition of quantum states, a bit can be in both the states '0' and '1' at the same time. This feature of the quantum bit or qubit has no parallel in classical systems. Currently, quantum computers consisting of 4 to 7 qubits in a 'quantum computing register' have been built. Innovative algorithms suited to quantum computing are now beginning to emerge, applicable to sorting and cryptanalysis, and other applications. A framework for overcoming slightly inaccurate quantum gate interactions and for causing quantum states to survive interactions with surrounding environment is emerging, called quantum error correction. Thus there is the potential for rapid advances in this field. Although quantum information processing can be applied to secure communication links (quantum cryptography) and to crack conventional cryptosystems, the first few computing applications will likely involve a 'quantum computing accelerator' similar to a 'floating point arithmetic accelerator' interfaced to a conventional Von Neumann computer architecture. This research is to develop a roadmap for applying Sandia's capabilities to the solution of some of the problems associated with maintaining quantum information, and with getting data into and out of such a 'quantum computing accelerator'. We propose to focus this work on 'quantum I/O technologies' by applying quantum optics on semiconductor nanostructures to leverage Sandia's expertise in semiconductor microelectronic/photonic fabrication techniques, as well as its expertise in information theory, processing, and algorithms. The work will be guided by understanding of practical requirements of computing and communication architectures. This effort will incorporate ongoing collaboration between 9000, 6000 and 1000 and between junior and senior personnel. Follow-on work to fabricate and evaluate appropriate experimental nano/microstructures will be

  3. SEARCHING PROXIES OF INVESTMENT OPPORTUNITY SETS AND IDENTIFYING INFORMATION CONTENT

    Directory of Open Access Journals (Sweden)

    Hermeindito Kaaro

    2002-01-01

    Full Text Available The concept of the investment opportunity set (IOS, which was first noted by Myers (1977, plays an important role in the capital market because it implies future growth, which is relevant in predicting the shareholder's expected wealth. Unfortunately, IOS cannot be observed directly. Because IOS is an unobservable construct, the researcher must find appropriate proxies for IOS to capture Myers' idea. A number of studies have been done to obtain appropriate proxies of IOS. One major finding is presented by Kallapur and Trombley (1999, that suggests appropriate proxies of IOS and attempting to identify whether the IOS of the firms are credible for representing the future (realized growth. This paper attempts to review IOS literature, especially Kallapur and Trombley's study. Some limitations of their study are noted here. This paper proposes a method to confirm the constructs of IOS and develops a new model in searching appropriate proxies for IOS. The present model also allows researchers not only to determine appropriate proxies for IOS but also to identify which proxies of IOS have good or bad information content. Abstract in Bahasa Indonesia : Konsep investment opportunity set (IOS, yang pertama diungkapkan oleh Myers (1977, memiliki peranan penting dalam pasar modal karena berimplikasi adanya pertumbuhan di masa depan, yang relevan untuk meramalkan ekspektasi kekayaan pemegang saham. Namun, kelemahannya adalah IOS tidak dapat diamati langsung. Oleh karena itu, para peneliti harus mencari data yang tetap yang dapat mewakili variabel IOS agar sesuai dengan gagasan Myers. Beberapa penelitian telah dilakukan untuk itu termasuk penemuan dari Kallapur dan Trombley (1999 yang mengusulkan beberapa variabel yang tepat untuk mewakili IOS dan juga mencoba menentukan apakah IOS dari perusahaan-perusahaan cocok untuk menggambarkan pertumbuhan masa depan yang actual. Penelitian ini bertujuan mengkaji literature IOS, terutama penelitian Kallapur dan

  4. 78 FR 41190 - Notice of Request for Clearance of a new Information Collection: National Census of Ferry Operators

    Science.gov (United States)

    2013-07-09

    ... regarding routes, vessels, passengers and vehicles carried, funding sources and such other information as... data are intended to provide an aggregated source of information on ferry boat operations nationwide... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF...

  5. Deconvolution of IRTF Observations of Jupiter's Moon Io

    Science.gov (United States)

    Wernher, Hannah; Rathbun, Julie A.; Spencer, John R.

    2016-10-01

    Io is a active volcanic world with a heat output more than 40 times that of earth. While spacecraft have been used to study Io's volcanoes, their high level of variability requires Earth-based observations to reveal their eruptions in the absence of spacecraft data. Our nearly 20 years of observations from the NASA InfraRed Telescope Facility (IRTF) have been used to monitor volcanic eruptions on Io. Our observations allow us not only to better understand the eruption properties of Ionian volcanoes, but also how the volcanic eruptions affect the rest of the Jovian system, such as the Io plasma torus, sodium clouds, Jovian magnetosphere, and aurorae. While our Jupiter occultation lightcurves of an eclipsed Io have been the focus of this program, due to their ability to determine volcano brightnesses and 1D locations, those observations only allow us to measure volcanic eruptions on the sub-Jovian hemisphere. We also observe Io in reflected sunlight so that we can observe other longitudes on Io. But, brighter eruptions are required for us to be able to distinguish them above the reflected sunlight. We are able to increase the spatial resolution of these images of in order to detect and locate fainter hotspots. We have employed shift-and-add techniques using multiple short exposures to detect eruptions in the past (Rathbun and Spencer, 2010). We will report on the use of publically available deconvolution algorithms to further improve spatial resolution and hot spot detectability, using images of a standard star as our PSF, including experiments with performing the deconvolution both before and after shift and add. We will present results of observations from 2007 and 2013.

  6. Platform development for merging various information sources for water management: methodological, technical and operational aspects

    Science.gov (United States)

    Galvao, Diogo

    2013-04-01

    As a result of various economic, social and environmental factors, we can all experience the increase in importance of water resources at a global scale. As a consequence, we can also notice the increasing need of methods and systems capable of efficiently managing and combining the rich and heterogeneous data available that concerns, directly or indirectly, these water resources, such as in-situ monitoring station data, Earth Observation images and measurements, Meteorological modeling forecasts and Hydrological modeling. Under the scope of the MyWater project, we developed a water management system capable of satisfying just such needs, under a flexible platform capable of accommodating future challenges, not only in terms of sources of data but also on applicable models to extract information from it. From a methodological point of view, the MyWater platform obtains data from distinct sources, and in distinct formats, be they Satellite images or meteorological model forecasts, transforms and combines them in ways that allow them to be fed to a variety of hydrological models (such as MOHID Land, SIMGRO, etc…), which themselves can also be combined, using such approaches as those advocated by the OpenMI standard, to extract information in an automated and time efficient manner. Such an approach brings its own deal of challenges, and further research was developed under this project on the best ways to combine such data and on novel approaches to hydrological modeling (like the PriceXD model). From a technical point of view, the MyWater platform is structured according to a classical SOA architecture, with a flexible object oriented modular backend service responsible for all the model process management and data treatment, while the information extracted can be interacted with using a variety of frontends, from a web portal, including also a desktop client, down to mobile phone and tablet applications. From an operational point of view, a user can not only see

  7. Hesitant Triangular Fuzzy Information Aggregation Operators Based on Bonferroni Means and Their Application to Multiple Attribute Decision Making

    Science.gov (United States)

    Zhou, Xiaoqiang; Yang, Tian

    2014-01-01

    We investigate the multiple attribute decision-making (MADM) problems with hesitant triangular fuzzy information. Firstly, definition and some operational laws of hesitant triangular fuzzy elements are introduced. Then, we develop some hesitant triangular fuzzy aggregation operators based on Bonferroni means and discuss their basic properties. Some existing operators can be viewed as their special cases. Next, we apply the proposed operators to deal with multiple attribute decision-making problems under hesitant triangular fuzzy environment. Finally, an illustrative example is given to show the developed method and demonstrate its practicality and effectiveness. PMID:25140338

  8. Economic analysis of linking operating room scheduling and hospital material management information systems for just-in-time inventory control.

    Science.gov (United States)

    Epstein, R H; Dexter, F

    2000-08-01

    Operating room (OR) scheduling information systems can decrease perioperative labor costs. Material management information systems can decrease perioperative inventory costs. We used computer simulation to investigate whether using the OR schedule to trigger purchasing of perioperative supplies is likely to further decrease perioperative inventory costs, as compared with using sophisticated, stand-alone material management inventory control. Although we designed the simulations to favor financially linking the information systems, we found that this strategy would be expected to decrease inventory costs substantively only for items of high price ($1000 each) and volume (>1000 used each year). Because expensive items typically have different models and sizes, each of which is used by a hospital less often than this, for almost all items there will be no benefit to making daily adjustments to the order volume based on booked cases. We conclude that, in a hospital with a sophisticated material management information system, OR managers will probably achieve greater cost reductions from focusing on negotiating less expensive purchase prices for items than on trying to link the OR information system with the hospital's material management information system to achieve just-in-time inventory control. In a hospital with a sophisticated material management information system, operating room managers will probably achieve greater cost reductions from focusing on negotiating less expensive purchase prices for items than on trying to link the operating room information system with the hospital's material management information system to achieve just-in-time inventory control.

  9. Development of an information system for flood defences using a simulation model for operational management

    Energy Technology Data Exchange (ETDEWEB)

    Petkovski, L. [Univ. Sts Cyril and Methodius, Skopje (Yugoslavia). Faculty of Civil Engineering

    2000-07-01

    A flood defense system can be divided in two parts: physical and management. The physical part comprises the catchment area, the natural water network, the dynamism of the manmade structures (housing, infrastructure and industrial facilities) and the passive and active flood defense structures (reservoirs and riverbed alterations). The management part of the flood defense system is an information system for storage and processing of a large number of heterogeneous data which will be used as support in the process of making decisions on the regulated flows in the endangered region. The aim of the presented research is to contribute to the clarification of the basic components (hydrological, hydraulic and water resource related) in the development of the information system in both the planning and the implementation phase. A particular emphasis is given to the water resource module for operational management of a controlled retention space in a flood wave event. In this paper are described the basic approximations of the simulation module and the results of its application on a real water resource system, the flood defense of Skopje (the capital of Macedonia). The flood defense of the city is provided by a combination of two hydro-technical structures: the regulated river bed of Vardar River, with a maximum capacity of 1150 m{sup 3}/s and the Kozjak Reservoir (formed by a 114.1 m tall rock-Earth-fill dam on River Treska, a tributary of Vardar River) with a controlled retention space of 10{sup 8} m{sup 3}. (orig.)

  10. Application of environmental DNA analysis to inform invasive fish eradication operations

    Science.gov (United States)

    Davison, Phillip I.; Copp, Gordon H.; Créach, Véronique; Vilizzi, Lorenzo; Britton, J. R.

    2017-04-01

    Environmental DNA (eDNA) detection of non-native species has considerable potential to inform management decisions, including identifying the need for population control and/or eradication. An invasive species of European concern is the Asian cyprinid fish, topmouth gudgeon ( Pseudorasbora parva) . Here, eDNA analyses were applied at a commercial angling venue in southern England to inform operations aiming to eradicate P. parva, which had only ever been observed in one of the venue's seven unconnected angling ponds. Eradication of P. parva was initially attempted by repeated depletion of the population using fish traps (crayfish traps fitted with 5 mm mesh netting) and the introduction of native predators over a 4-year period. The very low number of P. parva captured following these eradication efforts suggested a possible population crash. Conventional PCR analysis of water samples using species-specific primers was applied to all seven ponds to confirm that P. parva was present in only one pond, that the eradication attempt had indeed failed and that the species' distribution in the pond appeared to be restricted to three bankside locations. The continued presence of P. parva at these locations was confirmed by subsequent trapping. Water samples from an adjacent, unconnected stream were also analysed using the eDNA methodology, but no DNA of P. parva was detected. The results suggest that further management action to eradicate P. parva be focused on the pond shown to contain the isolated P. parva population and thereby eliminate the risk of further dispersal. This study is the first to apply eDNA analysis to assess the efficacy of an eradication attempt and to provide evidence that the species was unlikely to be present in the other ponds, thus reducing the resources needed to control the species.

  11. The Integration of Total Lightning Information Into National Weather Service Operations

    Science.gov (United States)

    Darden, C.; Burks, J.; Bradshaw, T.; Boccippio, D.; Goodman, S.; Blakeslee, R.; McCaul, E.; Buechler, D.; Hall, J.; Bailey, J.

    2003-12-01

    The collocation of a National Weather Service (NWS) Forecast Office with atmospheric scientists from NASA/Marshall Space Flight Center (MSFC) and the University of Alabama in Huntsville (UAH) has afforded a unique opportunity for science sharing and technology transfer. One such technology transfer is the utilization of the North Alabama Lightning Mapping Array (LMA) in daily forecast and warning operations. The LMA consists of ten VHF receivers deployed across northern Alabama and a base station located at the National Space Science and Technology Center (NSSTC) on the UAH campus. Preliminary investigations have shown a strong correlation between the time rate-of-change (trending) of total lightning and changes in intensity/severity of the parent convective cell. It is hoped that through the use of near real-time total lightning information, in conjunction with other remote sensing datasets (radar, satellite, observations), that the forecaster can achieve an even greater level of situational awareness. The primary mission of the NWS is to protect life and property. The utilization of the LMA data may prove to be a vital contributor to this mission by enhancing severe weather warning and decision-making, improving warning lead times, and increasing the probability of detection of severe and hazardous weather. To maximize the use of total lightning information, the LMA data is being ingested in real-time into the NWS Advanced Weather Interactive Processing System (AWIPS) decision support system. The presentation will focus on the collaborative process, technology transfer methodologies and a look to the future. In addition, a brief review of recent LMA case studies will be provided.

  12. Design and Implementation of Multi Agentbased Information Fusion System for Decision Making Support (A Case Study on Military Operation

    Directory of Open Access Journals (Sweden)

    Arwin Datunaya Wahyudi Sumari

    2013-09-01

    Full Text Available Quick, accurate, and complete information is highly required for supporting strategically impact decision making in a Military Operation (MO in order to reduce the decision cycle and to minimize the loss. For that purpose, we propose, design and implement a hierarchical Multi Agentbased Information Fusion System for Decision Making Support (MAIFSDMS. The information fusion is implemented by applying Maximum Score of the Total Sum of Joint Probabilities (MSJP fusion method and is done by a collection of Information Fusion Agents (IFA that forms a multiagent system. MAIFS uses a combination of generalization of Dasarathy and Joint Director’s Laboratory (JDL process models for information fusion mechanism. Information fusion products that are displayed in graphical forms provide comprehensive information regarding the MO’s area dynamics. By observing the graphics resulted from the information fusion, the commandant will have situational awareness and knowledge in order to make the most accurate strategic de cision as fast as possible.

  13. I/O Performance of Virtualized Cloud Environments

    Energy Technology Data Exchange (ETDEWEB)

    Ghoshal, Devarshi; Canon, Shane; Ramakrishnan, Lavanya

    2011-11-03

    The scientific community is exploring the suitability of cloud infrastructure to handle High Performance Computing (HPC) applications. The goal of Magellan, a project funded through DOE ASCR, is to investigate the potential role of cloud computing to address the computing needs of the Department of Energy?s Office of Science, especially for mid-range computing and data-intensive applications which are not served through existing DOE centers today. Prior work has shown that applications with significant communication orI/O tend to perform poorly in virtualized cloud environments. However, there is a limited understanding of the I/O characteristics in virtualized cloud environments. This paper will present our results in benchmarking the I/O performance over different cloud and HPC platforms to identify the major bottlenecks in existing infrastructure. We compare the I/O performance using IOR benchmark on two cloud platforms - Amazon and Magellan. We analyze the performance of different storage options available, different instance types in multiple availability zones. Finally, we perform large-scale tests in order to analyze the variability in the I/O patterns over time and region. Our results highlight the overhead and variability in I/O performance on both public and private cloud solutions. Our results will help applications decide between the different storage options enabling applications to make effective choices.

  14. The collapse of Io's primary atmosphere in Jupiter eclipse

    Science.gov (United States)

    Tsang, Constantine C. C.; Spencer, John R.; Lellouch, Emmanuel; Lopez-Valverde, Miguel A.; Richter, Matthew J.

    2016-08-01

    Volcanic outgassing due to tidal heating is the ultimate source of a tenuous SO2 atmosphere around Jupiter's moon Io. The question of whether SO2 frost on the surface plays a part, and to what degree, in maintaining Io's atmosphere with the constant volcanic outgassing is still debated. It is believed that for a sublimation-supported atmosphere, the primary atmosphere should collapse during eclipses by Jupiter, as the SO2 vapor pressure is strongly coupled to the temperature of the ice on the surface. No direct observations of Io's atmosphere in eclipse have previously been possible, due to the simultaneous need for high spectral and time sensitivity, as well as a high signal-to-noise ratio. Here we present the first ever high-resolution spectra at 19 µm of Io's SO2 atmosphere in Jupiter eclipse from the Gemini telescope. The strongest atmospheric band depth is seen to dramatically decay from 2.5 ± (0.08)% before the eclipse to 0.18 ± (0.16)% after 40 min in eclipse. Further modeling indicates that the atmosphere has collapsed shortly after eclipse ingress, implying that the atmosphere of Io has a strong sublimation-controlled component. The atmospheric column density—from pre-eclipse to in-eclipse—drops by a factor of 5 ± 2.

  15. Magma ascent pathways associated with large mountains on Io

    Science.gov (United States)

    McGovern, Patrick J.; Kirchoff, Michelle R.; White, Oliver L.; Schenk, Paul M.

    2016-07-01

    While Jupiter's moon Io is the most volcanically active body in the Solar System, the largest mountains seen on Io are created by tectonic forces rather than volcanic construction. Pervasive compression, primarily brought about by subsidence induced by sustained volcanic resurfacing, creates the mountains, but at the same time inhibits magma ascent in vertical conduits (dikes). We superpose stress solutions for subsidence, along with thermal stress, (both from the "crustal conveyor belt" process of resurfacing) in Io's lithosphere with stresses from Io mountain-sized loads (in a shallow spherical shell solution) in order to evaluate magma ascent pathways. We use stress orientation (least compressive stress horizontal) and stress gradient (compression decreasing upwards) criteria to identify ascent pathways through the lithosphere. There are several configurations for which viable ascent paths transit nearly the entire lithosphere, arriving at the base of the mountain, where magma can be transported through thrust faults or perhaps thermally eroded flank sections. The latter is consistent with observations of some Io paterae in close contact with mountains.

  16. Jovian Dust Streams: A monitor of Io's volcanic plume activity

    CERN Document Server

    Krüger, H; Horányi, M; Graps, A L; Kempf, S; Srama, R; Moragas-Klostermeyer, G; Moissl, R; Johnson, T V; Grün, E; Krueger, Harald; Geissler, Paul; Horanyi, Mihaly; Graps, Amara L.; Kempf, Sascha; Srama, Ralf; Moragas-Klostermeyer, Georg; Moissl, Richard; Johnson, Torrence V.; Gruen, Eberhard

    2003-01-01

    Streams of high speed dust particles originate from Jupiter's innermost Galilean moon Io. After release from Io, the particles collect electric charges in the Io plasma torus, gain energy from the co-rotating electric field of Jupiter's magnetosphere, and leave the Jovian system into interplanetary space with escape speeds over $\\rm 200 km s^{-1}$. Galileo, which was the first orbiter spacecraft of Jupiter, has continuously monitored the dust streams during 34 revolutions about the planet between 1996 and 2002. The observed dust fluxes exhibit large orbit-to-orbit variability due to systematic and stochastic changes. After removal of the systematic variations, the total dust emission rate of Io has been calculated. It varies between $10^{-3}$ and $\\mathrm{10} \\rm kg s^{-1}$, and is typically in the range of 0.1 to $\\rm 1 kg s^{-1}$. We compare the dust emission rate with other markers of volcanic activity on Io like large-area surface changes caused by volcanic deposits and sightings of volcanic plumes.

  17. Flood lavas on Earth, Io and Mars

    Science.gov (United States)

    Keszthelyi, L.; Self, S.; Thordarson, T.

    2006-01-01

    Flood lavas are major geological features on all the major rocky planetary bodies. They provide important insight into the dynamics and chemistry of the interior of these bodies. On the Earth, they appear to be associated with major and mass extinction events. It is therefore not surprising that there has been significant research on flood lavas in recent years. Initial models suggested eruption durations of days and volumetric fluxes of order 107 m3 s-1 with flows moving as turbulent floods. However, our understanding of how lava flows can be emplaced under an insulating crust was revolutionized by the observations of actively inflating pahoehoe flows in Hawaii. These new ideas led to the hypothesis that flood lavas were emplaced over many years with eruption rates of the order of 104 m3 s-1. The field evidence indicates that flood lava flows in the Columbia River Basalts, Deccan Traps, Etendeka lavas, and the Kerguelen Plateau were emplaced as inflated pahoehoe sheet flows. This was reinforced by the observation of active lava flows of ??? 100 km length on Io being formed as tube-fed flow fed by moderate eruption rates (102-103 m3 s-1). More recently it has been found that some flood lavas are also emplaced in a more rapid manner. New high-resolution images from Mars revealed 'platy-ridged' flood lava flows, named after the large rafted plates and ridges formed by compression of the flow top. A search for appropriate terrestrial analogues found an excellent example in Iceland: the 1783-1784 Laki Flow Field. The brecciated Laki flow top consists of pieces of pahoehoe, not aa clinker, leading us to call this 'rubbly pahoehoe'. Similar flows have been found in the Columbia River Basalts and the Kerguelen Plateau. We hypothesize that these flows form with a thick, insulating, but mobile crust, which is disrupted when surges in the erupted flux are too large to maintain the normal pahoehoe mode of emplacement Flood lavas emplaced in this manner could have

  18. Specific Features of Reflection of Information Regarding Lease Operations in the National and International Standards

    Directory of Open Access Journals (Sweden)

    Nikolenko Nataliya V.

    2013-12-01

    Full Text Available The article identifies the degree of correspondence of the national Provisions (Standard of Business Accounting (PSBA Lease with the international standard and provides recommendations with respect to their closing up. On the results of the study the author provides specific features of international and national standards – the existing IFRS 17 Lease and national PSBA 14 Lease by the following components: definition of lease, its classification and reflection in accounting. Also the text of PSBA 31 Financial Expenditures is supplemented with provisions on capitalisation of financial expenditures prospectively, which would allow avoidance of correction of the balance of the retained income and provision of comparative information for previous periods. The article provides an algorithm of division of lease for accounting purposes on the basis of international standards. Its use would ensure correctness of reflection of lease operations in accounting and would serve as a basis for development of methodical provisions with respect to accounting. By the result of the study the author forms definition of the qualification asset as an asset which requires considerable time for its creation, preparation for target use, sales or acquisition of the ownership right. Capitalisation of such expenditures would allow non-reduction of the accounting income and also would provide a possibility to reflect financial expenditures in accordance with their economic essence.

  19. A computational model for knowledge-driven monitoring of nuclear power plant operators based on information theory

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Man Cheol [Department of Nuclear and Quantum Engineering, Korea Advanced Institute of Science and Technology, 373-1, Guseong-dong, Yuseong-gu, Daejeon 305-701 (Korea, Republic of)]. E-mail: charleskim@kaist.ac.kr; Seong, Poong Hyun [Department of Nuclear and Quantum Engineering, Korea Advanced Institute of Science and Technology, 373-1, Guseong-dong, Yuseong-gu, Daejeon 305-701 (Korea, Republic of)

    2006-03-15

    To develop operator behavior models such as IDAC, quantitative models for the cognitive activities of nuclear power plant (NPP) operators in abnormal situations are essential. Among them, only few quantitative models for the monitoring and detection have been developed. In this paper, we propose a computational model for the knowledge-driven monitoring, which is also known as model-driven monitoring, of NPP operators in abnormal situations, based on the information theory. The basic assumption of the proposed model is that the probability that an operator shifts his or her attention to an information source is proportional to the expected information from the information source. A small experiment performed to evaluate the feasibility of the proposed model shows that the predictions made by the proposed model have high correlations with the experimental results. Even though it has been argued that heuristics might play an important role on human reasoning, we believe that the proposed model can provide part of the mathematical basis for developing quantitative models for knowledge-driven monitoring of NPP operators when NPP operators are assumed to behave very logically.

  20. A computational model for knowledge-driven monitoring of nuclear power plant operators based on information theory

    Energy Technology Data Exchange (ETDEWEB)

    Man Cheol Kim; Poong Hyun Seong [Korea Advanced Institute of Science and Technology, Daejeon (Korea). Department of Nuclear and Quantum Engineering

    2006-03-15

    To develop operator behavior models such as IDAC, quantitative models for the cognitive activities of nuclear power plant (NPP) operators in abnormal situations are essential. Among them, only few quantitative models for the monitoring and detection have been developed. In this paper, we propose a computational model for the knowledge-driven monitoring, which is also known as model-driven monitoring, of NPP operators in abnormal situations, based on the information theory. The basic assumption of the proposed model is that the probability that an operator shifts his or her attention to an information source is proportional to the expected information from the information source. A small experiment performed to evaluate the feasibility of the proposed model show that the predictions made by the proposed model have high correlations with the experimental results. Even though it has been argued that heuristics might play an important role on human reasoning, we believe that the proposed model can provide part of the mathematical basis for developing quantitative models for knowledge-driven monitoring of NPP operators when NPP operators are assumed to behave very logically. (author)